2 Privacy.com
What is my IP?      Check IP      Browser Test      Firewall Review      IP Test      Internet Security     

Internet Security Tips

Internet Security

Online Security Tips

While viruses and privacy concerns could be considered as passive threats, hackers take a more active approach to attacking your PC directly. We use computers for everything from banking and investing to shopping and communicating with others. Of course, you do not want strangers get access to personal information stored on your computer (such as financial statements), use your computer to attack other systems, send forged email from your computer, read your e-mails etc.
Without a full firewall protection solution, privacy thieves have an open doorway to your computer and all of your personal information. It is very simple for just about anybody to come through your internet connection and access your computer. At that point they can perform many malicious acts or steal all of your private information. There are hundreds of ways this can be accomplished. A firewall is a guard between you and the internet, this can be either a software or hardware firewall. It regulates access of program between you and the internet. Firewall protection is very useful and very necessary for users who are always connected to the internet. Firewalls work in the background controlling inbound and outbound traffic and notifies the user of any intrusion attempts on their system.

2 Privacy.com Tests

Check My IP location
My IP whois information
Internet Privacy test
Check IP geo location
My IP Address
Proxy Test/Proxy Judge
Check site geo location
IP Address Whois
Java IP Test

Online Security

These are the most basic internet security tips every computer user should follow to protect security and keep computer and data safe and secure.

Do not reveal personal information to strangers or just-met "friends"
Be very careful to whom you give your personal information and where you post information. The speed of the Internet is often reflected in rapid online acquaintanceships and friendships. There are people on the Internet who can be trusted, but there are also people on the Internet who can't be trusted, and it is very difficult to tell them apart. Your best bet is not to trust anyone you don't know in person.

Do not reveal personal information inadvertently
Most of the computer programs, like Email handlers, browsers etc, have options that you can set to specify personal details. Leave them blank or if the system insists, then give a reasonable looking but fictitious name.

Use strong passwords. Choose passwords that has no relation to you as a person and are difficult or impossible to guess. Use a combination of numbers, symbols, and letters and make sure it is at least 6 characters long. Change your password frequently. Try not to keep it written down. Avoid using the same password for multiple accounts. How to use password generator software.

Backup your files on a regular basis. You should store your backup copy in a separate location from your work files, one that is preferably not on your computer.

Do not keep a computer online when not in use. If you have DSL or ADSL connection to the Internet, then the backdoor of your computer is always open. Always switch off your computer or physically disconnect it from Internet connection when you leave it.

Use virus protection software.
• Install reliable anti-virus software.
• Update your anti-virus software regularly.
• Configure your anti-virus software to scan all the files on your computer periodically.
Make sure your family members, employees, or others that may be using your computer, recognize virus alerts and know what to do should one attempt to infect your system or in the event it succeeds.

Use firewall. Use a firewall as a guard between you and the internet, this can be either a software or hardware firewall. It is essential for those who keep their computers online through the popular DSL and cable modem connections but they are also valuable for those who still use standard modem dial-up. Firewalls work in the background controlling inbound and outbound traffic and notifies the user of any intrusion attempts on their system.

Use encryption Computer networks are not, by themselves, particularly secure. When sending or receiving confidential information such as a financial transaction, encryption ensures that no unauthorized parties have access to that data. Encryption is extremely important for passwords. Sending an unencrypted password across the network gives an open invitation to hackers. Once your password has been compromised, a hacker can access your personal e-mail as well as your personal data and data stored on shared systems.
There are some good encryption software programs available. If things are really sensitive, even up to defence of the realm, then this is the way to go.

Keep a "clean" e-mail address. Use e-mail address from one of the free services for all general correspondence and as the return address in your browser. If too many spam messages come your way, cancel it and start a new one. Keep your proper e-mail address for friends and trusted business contacts.

Do not open e-mail attachments from strangers, regardless of how enticing the subject line or attachment may be. Be suspicious of any unexpected e-mail attachment from someone you do know because it may have been sent without that person's knowledge from an infected machine.

Do not reply to spammers, for any reason If you reply, or even ask for your name to be removed from the spammers list, this confirms that the e-mail has been read by an actual person, and you will receive even more spams. There are some spam filters available.

Don't give out credit card numbers in a non-secure environment. If you're making a purchase through a web site, read the company's security policy before you buy. A secure web page will usually have a URL that begins "https" (instead of "http"), and most browers will alert you to the fact that you are going to a secured (or unsecured) page. A secure server will show on your browser with a closed lock icon at the bottom in Windows, or at the top on Mac.

Don't log in to sensitive accounts (e.g. your online banking account) from a computer that is shared (such as in a webcafe).

Turn on cookie notices in your web browser and/or use cookie management software. Most cookies are useful in web surfing. The Internet offers a wide variety of useful services such as free e-mail accounts, online forums, and e-commerce sites. The use of cookies is essential for these sites. But, in one of their malevolent forms, cookies from one web site might track your visits to a different web site.
There is an option in web browsers to display a warning if any visited website wants to send you a cookie to be stored and allow you to decide whether or not to accept it. You can also use cookies management software and services.

Disable scripts While most of scripts are useful and used to increase the functionality of web sites, some are harmful as can be used to get access to your personal information or cause damage to your PC based on the information about your computer. To avoid the problem turn scripts off while surfing, and only turn them on when a site you trust and want to use requires them. Scripts disabling will keep you from being vulnerable to malicious scripts, however, it will limit the interaction you can have with some web sites.

Glossary of Internet Security terms

Use this glossary whenever you come across a term you don't understand.
A | B | C | D | E | F
G | H | I | J | K | L
M | N | O | P | Q | R
S | T | U | V | W | X
Y | Z

Access Control Lists
Rules for packet filters (typically routers) that define which packets to pass and which to block
Access Router
A router that connects your network to the external Internet. Typically, this is your first line of defense against attackers from the outside Internet. By enabling access control lists on this router, you'll be able to provide a level of protection for all of the hosts ''behind'' that router, effectively making that network a DMZ instead of an unprotected external LAN.
Anti-Virus Software
Anti-Virus software scans a computer's memory and disk drives for viruses. If it finds a virus, the application informs the user and may clean, delete or quarantine any files, directories or disks affected by the malicious code.
Application-Layer Firewall
A firewall system in which service is provided by processes that maintain complete TCP connection state and sequencing. Application layer firewalls often re-address traffic so that outgoing traffic appears to have originated from the firewall, rather than the internal host.
An attempt to subvert or bypass a system's security. Attacks may be passive or active. Active attacks attempt to alter or destroy data. Passive attacks try to intercept or read data without changing it.
The process of determining the identity of a user that is attempting to access a system.
The process of determining what types of activities are permitted. Usually, authorization is in the context of authentication: once you have authenticated a user, they may be authorized different types of access or activity.
Cable modem
A Modem designed for use on a TV coaxial cable circuit. Usually providing high-speed asymmetric Internet connectivity.
Circuit-level gateway
Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
The ability to communicate between computers and terminals. Can be a physical or logical connection path.
A cookie is a piece of data which often includes an unique identifier, that is sent to your browser from a web site you visit, stores as a file on your computer, identifies you as a unique user and track your web usage. In certain cases (determined by the data in the cookie itself), the client returns the cookie to the server that originally delivered it. Persistent cookies are created in order to recognize users when they return to a website and enable the site to offer a customized experience tailored to that user - such as remembering your name and password on protected login pages.
Data Driven Attack
A form of attack in which the attack is encoded in innocuous-seeming data which is executed by a user or other software to implement an attack. In the case of firewalls, a data driven attack is a concern since it may get through the firewall in data form and launch an attack against a system behind the firewall.
The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password.
DNS server
Domain Name System server. A computer that keeps a database of domain names and their corresponding IP addresses. When a computer sends a domain name to a DNS server, the server returns the IP address for that domain. The Domain Name System is a mechanism used in the Internet or Intranet for translating names to host computers into addresses. DNS allows host computers not directly on the Internet to have registered names in the same style. DNS allows you to use the Internet without remembering long lists of numbers.
DNS spoofing
Assuming the DNS name of another system by either corrupting the name service cache of a victim system, or by compromising a domain name server for a valid domain.
DOS (Denial-Of-Service) attack
A malicious kind of attack that floods the intended destination IP address with requests. Example: by pinging 400 to 500 times per second.
Dynamic IP
A dynamic IP address is an IP address that changes periodically. A different IP address may be assigned every time you connect to the Internet. This makes it more difficult for the others to locate your computer or other devices from elsewhere on the Internet.
Encrypting Router
See Tunneling Router and Virtual Network Perimeter.
A method of scrambling or encoding data to prevent unauthorized users from reading or tampering with the data. Only individuals with access to a password or key can decrypt and use the data. The data can include messages, files, folders, or disks.
A firewall is a barrier between your network and the Internet, through which only authorized traffic can pass. This can be either a software or hardware firewall.
Software: The program is installed onto your computer to control access between your computer and the internet. Hardware: This is a piece of equipment that connects to the outside of your computer. The Hardware Firewall (Router) Connects to your DSL/Cable modem then to the internet giving you the most protection.
File Transfer Protocol. A standard protocol for copying files to and from remote computers over TCP/IP networks, such as the Internet. FTP uses ports 20 and 21. FTP is commonly used to download programs and other files to your computer from other servers. It is also used to upload Web page files to your own Web site. SFTP is a secure version of FTP. SFTP protocol allows you to securely transfer your files in a way that resembles traditional ftp, except it uses strong encryption so that your password and data aren't sent in clear text.
A gateway is what it sounds like. It's an entrance and an exit into a communication network. A gateway intercepts and steers electronic signals from one network to another. In data networks, gateways are typically a node on both two networks that connects two otherwise incompatible networks.
A person who attempts unauthorized access of other people's computers for the purpose of obtaining information on those computers or to do damage to those computers.
High anonymous proxy server
These proxy servers do not pass an IP-address of a client and don't send any variables indicating that you are using proxy server to host and look like real browser.
HyperText Transfer Protocol. A set of rules for requesting pages from a web server and transmitting pages (including text, graphic images, sound, video, and other multimedia files) to the requesting Web browser. HTTP uses TCP port 80.
HTTP proxy server
HTTP proxy server is a proxy allowing to work on the Internet with HTTP and (not always) FTP protocols. It can carry out caching of information downloaded from the Internet.
Now HTTP proxy servers are the most widespread. Their support (ability to use them) is included into many programs: browsers, download managers etc. However, their support is not realized at a level of an operating system - in order to use them, you should configure all programs, which should use proxies, in an appropriate way.
HyperText Transfer Protocol Secure. A variation of HTTP that uses encryption to transmit data securely (secure HTTP). HTTPS uses TCP port 443.
Internet Control Message Protocol is a network-layer Internet protocol that provides message packets to report errors and other information relevant to IP packet processing. ICMP provides a number of diagnostic functions and can send error packets to host. ICMP uses the basic support of IP and is an integral part of IP.
Instant Messaging
A type of communications service that enables you to create a private chat room with another individual. Typically, the instant messaging system alerts you whenever somebody on your private list is online. You can then initiate a chat session with that particular individual. There are several competing instant messaging systems. Unfortunately, there's no standard, so anyone you want to send instant messages to must use the same instant messaging system that you use.
An intranet is a private LAN designed for use by everyone within an organization. The essential idea of an intranet is that it uses LAN (and WAN) technologies to facilitate communication between people and improve the knowledge base of an organization's employees.
Unauthorized access to computer systems and networks, usually for malicious activity.
IP address
Internet Protocol address. A 32-bit numeric address assigned to hosts that use TCP/IP. The address for a host must be unique on the network. IP addresses are usually expressed as four decimal numbers, each ranging from 0 to 255, separated by periods. For example,
IP Spoofing
A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that host. Some routers and firewalls arrangements can offer protection against IP spoofing.
Internet Service Provider is an organization that provides access to the Internet.
Java applet
A small program that runs in a restricted environment that is managed by your browser. Most Java applets are used to add multimedia effects, interactivity, or other functionality to a web page, but they can be used for malicious purposes.
A scripting language that is similar to, but less capable than, Java. JavaScript code can be included in web pages to add interactivity and other functionality.
LAN (Local Area Network)
A computer network that serves users in a limited area such as a building. One local area network can be linked to another. Two or more local area networks are called a Wide Area Network (WAN).
The process of storing information about events that occurred on the firewall or network.
Network Address Translation is an Internet standard that enables a local area network to use one set of IP addresses for internal traffic and a second set of IP addresses for external traffic. This allows a company to shield internal addresses from the public Internet. NAT translates the internal local addresses into globally unique IP addresses before sending packets to the outside network.
A group of two or more computer systems linked together. There are many types of computer networks, including LANs and WAN.
Network-Layer Firewall
A firewall in which traffic is examined at the network protocol packet layer.
A logical grouping of information that includes a header and(usually) user data. A continuous sequence of binary digits of information is switched through the network and an integral unit.
Packet filtering
Security established through the use of a set of filter rules that operates by examining IP packets to allow them to pass or not. A router that implements packet filtering is known as a screening router or firewall router.
A temporary fix to a program bug. A patch is an actual piece of object code that is inserted into (patched into) an executable program.
Short for Pretty Good Privacy. PGP is a technique for encrypting messages. PGP is one of the most common ways to protect messages on the Internet because it is effective, easy to use, and free. PGP is based on the public-key method, which uses two keys -- one is a public key that you disseminate to anyone from whom you want to receive a message. The other is a private key that you use to decrypt messages that you receive.
A method by which an ICMP packet is sent over a TCP/IP network to a particular address and echoed back to confirm that a particular site can be reached via the network.
In TCP/IP and UDP networks, an endpoint to a logical connection. By convention, some protocols use a well-known port number (for example, HTTP uses port 80), although this is configurable.
Proxy / Proxy Server
A proxy server is a kind of buffer between your computer and the Internet resource(s) you are accessing. The data you request come to the proxy first, and only then it transmits the data to you. A proxy server receives a request for an Internet service (such as a web page request) from a user. If the proxy server is also a cache server, it can use its local cache of previously downloaded web pages to provide the page without forwarding the request to the Internet. If the page is not in the cache, the proxy server uses one of its own IP addresses to request the page from the server on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it to the user.
Proxy cascade (proxy chain)
Proxy chain (cascade) is a connection of 2 or more proxy servers. To make a proxy chain you can use as many proxy servers as you can or want.
A device that performs routing and appropriate paths for data packets across networks as it traverses an internetwork or WAN.
Screening Router
A router configured to permit or deny traffic based on a set of permission rules installed by the administrator.
Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client.
A program and/or device that monitors data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker's arsenal. On TCP/IP networks, where they sniff packets, they're often called packet sniffers.
Social Engineering
An attack based on deceiving users or administrators at the target site. Social engineering attacks are typically carried out by telephoning users or operators and pretending to be an authorized user, to attempt to gain illicit access to systems.
Transport Control Protocol/Internet Protocol. TCP/IP is the standard method of sending data on the Internet. It is based on data packets that have a set format, including to and from addresses. Generally refers to the Internet Protocol Suite, which includes TCP and IP, as well as several other protocols used by computers to communicate with each other. TCP/IP is the standard protocol used on the Internet. It can also be used as a communications protocol in intranets and extranets. TCP/IP is a two-layered program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination.
Tunneling Router
A router or system capable of routing traffic by encrypting it and encapsulating it for transmission across an untrusted network, for eventual de-encapsulation and decryption.
User Datagram Protocol (UDP)
User Datagram Protocol is a connectionless protocol. It uses IP to send datagrams in a similar way to TCP, except that like IP, and unlike TCP, UDP does not ensure the packets reach their destination. UDP is used in applications where it is not essential for 100% of the packets to arrive. While TCP is safer, UDP is often faster.
Virtual Network Perimeter
A network that appears to be a single protected network behind firewalls, which actually encompasses encrypted virtual links over untrusted networks.

What is a computer virus?
What kind of damage can computer viruses do?
What are the main types of computer viruses?
How do viruses spread?
How do I know if my computer is infected by a virus?
How do viruses work?
How can I protect my computer from viruses?
Where can I find anti-virus programs?
Can data files be infected?
Can firewalls detect a virus?
Are there CMOS viruses?
Are there BIOS viruses?
Why some viruses can be detected but not cleaned with the anti-virus software?
What is a macro virus and how does it spread?
What's the worst damage a macro virus can do?
How to minimize Word macro viruses' destruction to hard disks and files?
Can email message be infected?
Will I be infected when I access Internet FTP Server? Will virus be downloaded during file downloading?
Will virus infect my machine if I connect to the Internet and view web pages/download programs?
What types of virus scanners exist?
What is a life cycle of a virus?
What are slow and fast infectors?
What methodes of virus scanning exist?
What is a boot sector?
What is a computer worm?
What is a Trojan Horse?
What is a Joke program?
What is a dropper?

Anonymous Surfing

What kind of information about my computer can be collected by web sites?
should I concern about privacy protection?
What is an IP address?
Why do I need anonymous surfing software?
How can I hide an IP address?
What is a proxy server?
What is a pay proxy server?
What anonymity levels of HTTP proxy servers exist?
Why should I use proxy servers?
What is HTTP proxy server?
What is SOCKS?
How can I configure my browser to use a proxy server?

Do I need to perform the proxy browser configuration every time I go online?
What do I do to exit a proxy server?
What is a proxy chain?
What are cookies and how do they work?
Where are cookies stored?
Can cookies read information from a user's hard drive?
How do web sites use cookies?
Can cookies be used maliciously?
Are Java applets threat to my security?
Can scripts (JavaScript, Visual Basic Script) be used maliciously?
Why should I remove traces of my Internet activity?


What is a firewall?
Why do I need a firewall?
Is a firewall enough?
What do firewalls protect you from?
How does a firewall work?
What is a software/hardware firewall?

Proxy Servers

What is a proxy server?
What is a pay proxy server?
What anonymity levels of HTTP proxy servers exist?
Why should I use proxy servers?
What is HTTP proxy server?
What is SOCKS?

How can I configure my browser to use a proxy server?
Do I need to perform the proxy browser configuration every time I go online?
What do I do to exit a proxy server?
What is a proxy chain?

Browser Configuration

Internet Explorer 4.x
Internet Explorer 5.x
Internet Explorer 6.0
Internet Explorer 7.0
Internet Explorer 8.0
Internet Explorer 9.0
Firefox 4.0
Mozilla 1.4

Opera 11
Opera 10
Opera 9
Opera 8
Opera 7
Netscape Navigator 8
Netscape Navigator 7
Netscape Navigator 6

Delete Cookies

What are cookies and how do they work?
Are there different kinds of cookies?
Where are cookies stored?
How long do cookies live?
Can cookies read information from a user's hard drive?
How do web sites use cookies?
Can cookies be used maliciously?
Can cookies be encrypted?
How can I delete cookies in Internet Explorer?
How can I delete cookies in Netscape Navigator?

How can I delete cookies in Opera?
How can I delete cookies in Mozilla?
How can I delete cookies in FireFox?
How can I enable cookies in Internet Explorer?
How can I enable cookies in Netscape Navigator?
How can I enable cookies in Opera?
How can I enable cookies in Mozilla?
How can I enable cookies in FireFox?
How can I disable cookies in Internet Explorer?
How can I disable cookies in Netscape Navigator?
How can I disable cookies in Opera?
How can I disable cookies in Mozilla?
How can I disable cookies in FireFox?

Erase files permanently How to find temporary internet files Temporary Internet Files location Temporary Internet Files size Deleting Temporary Internet Files Internet Explorer Temporary Internet files Firefox Temporary Internet Files Where temporary Internet files are located View Temporary Internet Files Temporary Internet Files Vista Temporary Internet Files Firefox How to Clear History
How to Clear history How to erase history files History cleaner software Wipe disk data tool How to clean hard drive files How to wipe hard drive Recover deleted files Wipe free space Clear history from computer
Erase firefox address history tracks and Delete browser address bar history Delete Search history Clear Address Bar Restore Address Bar Internet Explorer Delete Addres Bar History Browser Cache Clearing Clear Cache Delete cookies Delete Cookies Delete Recent Documents Erase History Internet history eraser Clean History Tips Delete Files Permanently

Question of the Day

• How can I clear Internet Explorer AutoComplete history?

To clear AutoComplete forms in Internet Explorer:
- Select "Tools" then "Internet Options".
- Open the "Content" tab.
- Click the "AutoComplete" button.
- Click the "Clear forms" button to delete all AutoComplete form data and/or click the "Clear Passwords" to delete stored passwords.
If you don't want Internet Explorer to save this data in the future, you can disable IE AutoComplete. Just remove check marks from the necessary check boxes.

 Copyright © 2012 2 Privacy.com All rights reserved. | Terms of Use | Privacy Policy | Site Map | Useful Links |
Tu., May 22, 2012