Skip to main content

Home/ Globaltech/ Group items tagged vpn

Rss Feed Group items tagged

anonymous

China Tightens Electronic Censorship - NYTimes.com - 2 views

  • A host of evidence over the past several weeks shows that Chinese authorities are more determined than ever to police cellphone calls, electronic messages, e-mail and access to the Internet in order to smother any hint of antigovernment sentiment. In the cat-and-mouse game that characterizes electronic communications here, analysts suggest that the cat is getting bigger
  • LinkedIn, a networking platform, was blocked for a day during the height of government concerns over Internet-based calls for protests in Chinese cities a few weeks ago, he said
  • China’s censorship machine has been operating ever more efficiently since mid-2008, and restrictions once viewed as temporary — like bans on Facebook, YouTube and Twitter — are now considered permanent. Government-friendly alternatives have sprung and developed a following
  •  
    This is similar to the Google accuses China... article and will help with the answers. Describe VPN. How does a proxy work? List a proxy you find useful. When would you use a proxy? Explain: Google has "played a role in manufacturing social disorder". march 25 Azman
  •  
    Describe VPN. A VPN means virtual private network and what it does is that it send you data over the Internet in a secure connection. It travels packet over unprotected network in a secured manner. It provides you tunnel which secures your data and send it encrypted form over the Internet. How does a proxy work? By using a proxy the web browser window is then coded as part of the proxy site address and not the real website the surfer is visiting. Any information cached in the temporary folder is that of the proxy, not the users. This means the user is not traced at all and the information is kept hidden. Article Source: http://EzineArticles.com/3786946 List a proxy you find useful. Tor Trycatchme anonsafe When would you use a proxy? When you want to hide your IP from anyone. It is a good idea to use it while online shopping, accessing bank websites, and putting personal information. Explain: Google has "played a role in manufacturing social disorder". This means that Google has been the source of creating all the social disorder in the real world. Examples of these social disorders include the Libyan Protests as well as the Egypt Protests. These are named as social disorders. And Google, who feeds information to the various organizations and governments as well as provide social networking interfaces play a role in the community to communicate with each other in order to plan these social disorder events, such as the protests to overthrow the government.
anonymous

http://edition.cnn.com/2010/TECH/web/12/13/5.online.privacy.tips/ - 6 views

  •  
    summary march 29 kuni
  •  
    1. Adjust social-network privacy settings, You should adjust privacy setting in Facebook by changing the privacy option in Facebook. Facebook updated its privacy dashboard in October, which now, it can change the privacy setting in mobile phone, and you don't have to do it in computer. You can also protect twitter to not let show in the public. 2. Ensure personal data is sent over a secure connection, You should find if the site is secured enough before giving a credit card number. Make sure the adress shows that the site is encrypted. 3. Consider opting out of ad tracking, You should get rid of ad tracking by disabling the third party cookies. Now, no one will be able to track your pc. 4. Use private Web browsing features or install a VPN Install VPN for more strong security for your browser. Such as Little Snich, which gives out a warning sign every time the website automatically changes your settings. 5. Think before you post. You should always check and think if the site is secured enough to give out a privacy information or post email. You have to be careful to not let hackers get into your computer. And don't give out privacy information even to friends.
anonymous

How to Keep Your Computer Secure Video - 5min.com - 9 views

  •  
    M13 List and describe the guidelines for PC security. M12 Describe additional guidelines that should be considered for PC security. August 31 Chut Jenny
  •  
    Additional Guidelines: Password locking/encrypting important, sensitive information containing files and folders. Using a proxy or a VPN, to access the internet through the tunnel that can also include encryption. A Proxy and a VPN can scramble your IP address so the website cannot track you.
  •  
    Types of Securities. Firewall is a program that protects against intrusions and it helps ensure privacy. Anti-virus protects against computer viruses. A computer virus is a program that can multiply itself and infect a computer without the owner of the computer knowing or permissions. Anti-whatever else, malware, adware, spyware, Trojans etc. Why do you need it? People should have security programs to protect their computer from viruses or hackers. If you don't have any type of protection for your computer for your computer, your valuable information maybe stolen by hackers or erased by viruses. If you get viruses on your computer, you may need to take it to shops to repair it and need to pay for it. When do I need to use security programs? It depends on the activities that you do on your computer. How can I get viruses? There are several ways that you can get viruses. Opening attachments from anonymous emails, downloading torrents, movies, pictures, music and porn can give you viruses. Where can I get the right programs for my computer? download.com sourceforge.net majorgeeks.com Computer forums
anonymous

How Egypt pulled its Internet plug - Computerworld - 3 views

  •  
    Sue Describe BGP. How does the BGP affect ISPs? Feb 4
  •  
     Describe BGP - BGP is the border gateway protocol, the protocol at the core of the internet's routing mechanism. BGP performs interdomain routing in Transmission-Control Protocol/Internet Protocol (TCP/IP) networks. BGP is an exterior gateway protocol (EGP), which means that it performs routing between multiple autonomous systems or domains and exchanges routing and reachability information with other BGP systems. - Control the pathways  How does the BGP affect ISPs? - BGP glues all ISPs and their large customers together to form the Internet. Besides traditional routing, BGP also supports routing for new IP services such as Multiprotocol Label Switching Virtual Private Network (MPLS VPN). - Without BGP information provided by Egyptian networks, the rest of the world has no way to connect with the country's ISPs or its Web sites. Nor do its citizens have a way to reach sites or services beyond its boundaries. - "The Egyptian government has instructed the ISPs whether state owned or sate licensed, to withdraw their BGP announcements that tell other routers how to reach those ISPs" -
anonymous

Web Browser Privacy Check - 8 views

  •  
    Try it. Explain the purpose of this site. What does *) mean? all aug 30 Az
  •  
    Explain the purpose of this site. The purpose of this site is to inform users what security related information is exposed by the web browser to any website that the users visited. This website can also be used to judge how effectively your identity is hidden if you are accessing the site via a proxy or a VPN. What does *) mean? The items marked with the asterisk will be most likely to be recorded by web servers.
anonymous

Former Gucci Employee Indicted For $200,000 Hack - International Business Times - 1 views

  •  
    brief april 26 az
  •  
    1. Identify the area of impact the scenario relates to. Business and employment 2. Identify the main stakeholders to the IT system. Gucci, employees 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. Virtual private network- a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internetas the medium for transporting data. These systems use encryption and othersecurity mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. http://www.webopedia.com/TERM/V/VPN.html Hacking- the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose. http://www.wisegeek.com/what-is-computer-hacking.htm Virtual servers- a Web server, that shares computer resources with other virtual servers. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer. http://www.webopedia.com/TERM/V/virtual_server.html E-mail Server - A computer server that acts as the supplier and sender of e-mails in the network. Ecommerce - Electronic commerce, business to sell and buy online electronically. Identity Theft - The stealing of and ID, or impersonating a fake person. 5. If possible, describe a solution to the concern (issue). Gucci needs to be stricter to their employees. They need to closely monitor anyone that can access the company's financial system and any vital part. By doing so, employees would not even think of hacking the system. Moreover, educating their workers into not being tricked to activate any other fraud employee accounts. Also, improving the authorization system of employees to access information with biometrics may be helpful to increase the security of their data and network system.
1 - 7 of 7
Showing 20 items per page