Monday 12 August 2013

Beef up Firefox Security

Mozilla Firefox is considered as one of the secured browsers. However the security level would also depend on the settings. There are some features related to security which has to be enabled manually. However you need to check those which have to be turned on by default. 
You can follow the steps given below:
Use master password
Never save your passwords in websites which you use frequently. Firefox would allow anyone who gets an access to your system to log in to the sites where you have saved your passwords. You would get a list of saved passwords and usernames through the options menu of Firefox. 
Firefox offers a master password feature which encrypts and protects the saved password list via secret code. You need to enter master password when enabled once per session. You always need to enter before viewing saved passwords through the options menu. This prevents casual probing of passwords. It prevents third-party utilities from knowing your passwords. It also prevents others from viewing or using saved login info.
To enable the master password feature, open the Firefox menu, select Options, select the Security tab, and then check the Use a master password option.
                                                           
          
Password for syncing
Firefox synchronizes your passwords, bookmarks and other browser data to Firefox browsers which are running on other systems as well as devices. All synced data are encrypted. It has more security than what others offer by default while setting new device or computer.  You need to sign in to the Firefox account with the sync password. You either take a recovery key from the device you have set up or enter pass code form new device into the old one.
In order to change the sync settings go to the Firefox menu, then options and select the Sync tab. Check as to whether the security options are enabled or not. Ensure that the first three security options are selected to protect the system against any malware as well as phishing attacks.
                                                      

Verify enabled security options
Just open the menu and select options. Now select the security tab. Check the first option ‘warn me when sites try to install add-ons’. Ensure that next two options ‘ block reported attack sites’ and ‘block reported web forgeries’ are checked which would enable protection against phishing and malware.  
                                            


Check the first option which would prevent websites from tracking online activity. Now you select privacy tab. If you want extra privacy, select first option Next, select the Privacy tab. And if you want more privacy online, select the first option,’ automatically start Firefox in a private browsing session’. This is an indication to the websites that you would like to be tracked.    
                                           

In content check first option, ‘block pop-up windows’. This would prevent   pop-up windows.
Now select the advanced tab, go to update sub tab and select ‘automatically check for updates to….’
Add-ons give more protection. Install these security-related add-ons for more protection 
                                            

Update as well as check plug-ins 
Cyber criminals use vulnerabilities in browser plug-ins to infect and attack computers. These plug-ins release updates to patch security holes. Several plug-ins are set by default to update automatically or notify the user. Check periodically for updates. You can use third party sites for updates for various browsers.   

Tuesday 9 July 2013

Get Rid of Runtime Errors

Runtime errors normally have a number code which would describe what error it is. However it would not reveal on how to resolve error. What do you do now? Just Google search the runtime error as well as the code in order to get good understanding of that error. One of the quickest ways to fix a runtime error is to turn off Error Checking:

You can go to Internet explorer, then tools menu. From here you select internet options. Click on Advanced tab. Check ‘disable script debugging’ box. Now you click at the bottom of window ‘apply’ and ‘ok’.

Mozilla Firefox:

Go to start, then right click on My Computer

Now select Properties

Now Click Advanced tab

Now click the Error Reporting tab

Now check Disable error reporting

Corrupt registry is one of the most common reasons for. By removing unnecessary files, games and applications you can clean the registry. This unnecessary stuff would use the valuable resources of the computer. You can also run a registry scan with the help of windows registry software. Once complete it would correct registry issues.

These errors indicate that there are bugs in hardware or software. There is a clash between the program and the registry. In case the system runs out of memory then registry would face issues. If you get runtime errors often then you can add RAM to your system. This error does not mean that the system has cashed.  

Regular troubleshooting techniques

One of the common troubleshooting techniques is to isolate the problems to a specific component through trial and error. What you need to do here is to swap attuned components and check whether the system works.  Swap compatible components and see if the system still works. You can try different peripherals on different machines and check whether the same problem occurs. Make the changes at a time.  

Most of the PC issues are related to connections as well as cables. Do check whether all cables are firmly connected.  Certain ribbon as well as power cables become loose. Do make it sure that the memory modules, microprocessor, adapters like sound and video card are properly inserted.  

Consider computer issues as an opportunity to learn. In fact troubleshooting PC issues is part of owning a system. You would also get a great deal of satisfaction by solving the problem yourself.
     

 Do take a note as to what all have you done in order to solve the PC issue. Also note down all the error messages. There are certain messages which can guide you to the solution of the problem.   

 Guide on PC maintenance:

If you have your used your system more than few hours a day then switch it off at the end of the day. You can also turn off the monitor at least to save electricity. Power surges expose the system to high as well as low temperatures which are not good for life. This is not good for life span of the components especially CPU, memory and hard disk.  The duration of electronic components would be increased if they run at a constant temperature as well as have adequate ventilation. 

You should use a UPS in case you experience power outage often. 
 
Do check whether the cooling fans on the CPU and the power supply are working properly or not. Clean on a regular basis the air pathway which is on the back of the power supply.   

 Tips on data recovery:

Accidental data loss of your organization can cause big issues for you as well as for your company. You can use data recovery utilities. If huge data is stored then use backup tapes and do it regularly. Make it a point to use UPS as sudden shutdown can crash systems.

Monday 8 July 2013

How Can Email Encryption Be of Help to You?

Email encryption is basically encryption and authentication of email messages. Your messages would be protected form In short e-mail encryption can be described as the authentication and encryption of e-mail messages, a process of protecting messages from unintended recipients. However this is not common due to several factors. Public-key- cryptography is being used as a new encryption process. This allows users to include a public key which allows others use the key to encrypt the message. Messages are encrypted to protect messages from inquisitive eyes. Given below the procedure on how to encrypt a mail:

It would be a bit expensive to go for technologies but it would be worth the pay. It makes the encryption affordable as well as easy. Various tools come with various policies but they help you to deliver encrypted email as per your requirements. The tools automate the encryption process and organizational mails can be sent among clients, individuals and groups. It would also manage security and reporting policies.  

It would give you a secure messaging within business associates, partners, individuals and customers.  If you are going for right tools then you would not need any other hardware or software.  


 In most case when you send an email it would be sent as plain text through web without encryption. Most of the servers use mail protocol which can support encryption, though it is one in one. Even Gmail chains encryption between its personal server and the recipient’s server. It cannot be assured that the mail would be totally secured between these two servers. While encrypting a message ensure that it reaches the area of interest only.  
  
Encryption is done with the help of private key and public key. In order to encrypt the message if you use a public key then a private key is required to decrypt it.  The process follows:

If you have to send message to people use public key. However you need to keep the private key secret. 

Again if someone wants to send you a message, he or she has to use the public key to encrypt the message. Since the private key is kept secret, it is only you who can decode the messages.

Encryption makes the email communication procedure secure and easy. Public key can be circulated without compromising with security of the personal communications.

How to connect a Wireless LAN



Users would get a major advantage as far as costs and efficiency is concerned if internet connection is shared. However setting up a home or office network is also advantageous as you need not spend too much on wiring. In this regards Wireless LAN is the best option. 

A wireless LAN is a network in which many computers share a single broadband Internet connection. It can be the DSL or cable. This however does not include printers. But it does include networked fax machines, networked printers and mobile phones.

You can set up Wireless LAN through the following steps:
  • First you need to decide on the device which would match the requirements. There are several brands of routers to choose from. These include D-Link, Linksys, Netgear, Buffalo and Apple. Just look for the best balance between performance and price.  
  • There are wireless routers which support the “N” specification. This is an upgraded WiFi standard which enables extended ranges as well as stronger signals. Now old devices would support “B” standard. Ensure that the router you are purchasing is compatible.  
                                 

  • There are four Ethernet ports for most of the routers. It is useful when you are daisy-chaining various routers for a bigger network as well as if you have devices in which a wired connection is required. Depending on capacity the cost varies.
  • Plug in the Ethernet cable from the DSL or cable modems to line or internet port on your router. Thereafter you connect the computer using numbered Ethernet ports which is at the back.
  • You can just open the web browser and get an access to 192.168.x.1. Now x can be replace with 0 or even 1. This would also depend on the router brand. This would surely open the setup interface.
  • You would require certain information in order to connect to the ISP like PPPoE password and username. These are signed with cable providers and connection is to plug and play.   
  •  Just set up the network and give it a name and select a security level. You need to choose among WPA, WEP and WPA2. You can choose the top security level which would be supported by other devices.
  • Choose a password. Now you can connect to PCs as you can add them. 
  • Once you have saved the settings restart router. You can connect each member of the network with the help of router using the passphrase.