Security

warning: Creating default object from empty value in /home/samaycsa3940/public_html/modules/taxonomy/taxonomy.pages.inc on line 33.
Computer and other Security Related Articles

How to disguise yourself as Googlebot

This article explains how to disguise your browser as a Googlebot. The immediate question that comes to mind is, "why would you want to do that". Have you ever come across search results in a search engine, that seem like what you are looking for and then when you click on, it tells you that you need to register or log on to view this content ? What if your browser was presented to the site as Googlebot? Most sites would allow Googlebot to crawl through so that it can index its pages.

How to verify the MD5 Checksum of a file in Windows

MD5 Checksum is a way to check that the file that you downloaded from the internet or a third party (untrusted source) is complete and unaltered. It basically insures that the file is exactly the same as to what the vendor is providing. The MD5 checksum verification insures that the file is complete and is not altered or corrupted in any way possible.

How to check if your virus scanner is working

In this day and age when most of our home computers are always connected to the internet, the importance of good virus scanning software can not be over emphasized. Most of us do have the virus scanners installed, but most of us also take them for granted. When was the last time when you actually went into your virus scanning software and checked if everything is hunky dory? Do you even know if it’s doing its job? You can create a test virus too and see if your virus scanner catches it

What is a botnet

The word Botnet gets its name by joining the words Bot and Net, bot is a short for Robots and Net for Network. In a one line definition, a BotNet is comprised of a network of computers which intends harm to the computer owner and also others. The reason it is known as a Robot Network is because it is "controlled" its master handlers or owners. These handlers or owners turn the infected machine into a zombie, which has no choice but to "obey" their commands.

PirateBay launches iPreadtor counter offensive to keep users safe and anonymous

PirateBay is launching the iPreadtor service to keep internet users safe and anonymous, so that they can not be tracked by law enforcement. This move comes in response to Intellectual Property Rights Enforcement Directive (IPRED) which gives Swedish authorities to track users from their respective ISPs for their internet activities including Torrent usage. The IPRED would come into effect starting April 2009, making users vulnerable to threats by law enforcement and privacy infringement.