Tuesday, May 22Care to be aware

Networking

GlassWire : A Must Have Network Security Tool

GlassWire : A Must Have Network Security Tool

Networking, Useful Applications
Who is your computer talking to? Your browser isn't the only application that's sending data online. Your word processor might be phoning home; a file undelete utility might be talking to its mother ship, and even Windows' own services may surprise you. These are not necessarily nefarious actions, but they're worth knowing about. GlassWire is a free and beautiful utility that lays all of this bare. GlassWire makes network traffic fun to watch. One of the most important things about GlassWire is that it's beautiful. This isn't a minor detail: For many users, network security is equal parts daunting and tedious. Having a tool that's just fun to pop open and watch throughout your day makes a big difference. The graph scrolls in real-time, and there's a zoom slider across the bottom of t...
NetBalancer : Controlilng & Prioritizing Internet Traffic

NetBalancer : Controlilng & Prioritizing Internet Traffic

Networking, Useful Applications
NetBalancer is an internet traffic control and monitoring tool designed for Microsoft Windows XP, 2003, Vista, 7, 8 with native x64 support. NetBalancer lets you restrict, monitor, define traffic rules, set limits, monitor usage etc. NetBalancer is an Internet traffic monitoring and controlling software that is available as a free and professional version. Installation and Requirements: The available versions are compatible with Windows 2003 32/64-bit, XP 32/64-bit, Vista 32-bit, Windows 7 32-bit, Windows 8 and Server 2012. The installation is quite simple, and hardly takes 2-3 for setup. Once the setup is complete we’ll have a taskbar icon/UI where the current speed/status will be displayed. NetBalancer pop-ups can be enabled disabled using taskbar icon. Features: Here are the
Remote Desktop: Complete Overview

Remote Desktop: Complete Overview

Concepts, Networking
  What is Remote desktop? Remote Desktop, a function included with Windows XP Professional, enables you to connect to your computer across the Internet from virtually any computer, Pocket PC, or smartphone. Unlike a typical VPN connection (which will give a remote PC access to the company network) Remote Desktop will actually allow you to see and control your connected PC as though you were sitting directly in front of it. Remote desktop vs VPN : Which is a better choice ? why? A VPN and Remote Desktop solve two different problems — perhaps slightly overlapping but mostly distinct and frequently complimentary capabilities. Remote Desktop (e.g., Microsoft RDP or VNC) let’s you sign on to a remote computer using the keyboard and mouse while viewing the screen much as if “yo
TOR Anonymity: Things Not To Do While Using TOR

TOR Anonymity: Things Not To Do While Using TOR

Concepts, Networking
Apart from all these available options, apparently, TOR stands out first in the line when we compare the level of anonymity provided by various tools. The Onion Router project has been regarded as the best cloak for those people who want to hide on the internet. Edward Snowden, who came to light after he acted as the whistleblower and exposed NSA’s unethical surveillance activities, used TOR browser to do so. The federal agencies also inculpated him and alleged that his disclosure of confidential information was the impetus behind the Paris death massacre. The Onion Router has the strength to protect you and hide you from all those stalkers and malevolent minds who follow you on the internet. Even if you want to be another Edward Snowden, you can very well do so, by using TOR browser
Tor : Everything You Need To Know

Tor : Everything You Need To Know

Concepts, Networking
  Tor or The Onion Router allows a person to browse the web anonymously by veiling the actual identity of the user. It protects the user from any traffic analysis and network spying.  Tor is perhaps the most popular and secure option available for anonymous internet connectivity. To reduce the confusion, here we are talking about the Tor network, not the web browser which is used to access the same. History of Tor Tor is based on the principle of ‘onion routing’ which was developed by Paul Syverson, Michael G. Reed and David Goldschlag at the United States Naval Research Laboratory in the 1990’s. The alpha version of Tor, named ‘The Onion Routing Project’ or simply TOR Project, was developed by Roger Dingledine and Nick Mathewson. It was launched on September 20, 2002. Furth
What Are Torrents and How It Works?

What Are Torrents and How It Works?

Concepts, Networking
Bittorrent, commonly known as torrent, is the one internet element where you are able to enjoy all sorts of content for absolutely no price tag and there are millions of users out there who take advantage of this service (For the discussion on illegal downloading, here’s another dedicated article). Nearly the whole globe has an application running on their computers or mobile device that gives them access to a wide range of movies, TV shows, games and myriad amounts of data through these torrents. Still, how knowledgeable are you on the workings of torrents?  To help you understand the working of torrents, we will be covering a wide area of topics, detailing topics like what torrents are and how torrent works so that you can come to terms with their existence in the World Wide Web. What
How to Setup & Configure Free VPN With Team Viewer VPN Client Software

How to Setup & Configure Free VPN With Team Viewer VPN Client Software

Networking, Useful Applications
  What is VPN? A virtual private network (VPN) is a network that uses Internet, to allow remote offices or individual users with secure access to their organization’s network just like in local area network. How to create free software VPN? Let’s start building free VPN.! The security achieved by tunneling like Layer Two Tunneling Protocol (L2TP). In VPN connections the sender encrypting data and receiver decrypting it at the receiving end thus creating a Tunnel. Usually CISCO VPN routers are used for corporate VPN setup. We will discuss more about VPN and VPN configuration in detail on later articles. Is it possible to create VPN without dedicated hardware like CISCO VPN router and leased line? Yes, with the help of VPN client softwares we can configure Virtual Private Network
Biggest VPN Myths that are better ignored

Biggest VPN Myths that are better ignored

Concepts, Networking
Virtual Private Network (VPN) is a technology that lets a user connect to a remote server and use the internet. Just recently, I wrote an article describing the benefits of using a VPN service. But, there are so many VPN myths surrounding this technology that stops many people from using it.  So, here we’ll take a look at the 7 most common VPN myths: Don’t believe these common VPN myths: Myth #1: I’m not doing anything illegal, I don’t need a VPN The most common VPN myth that’s spread among the internet users is that they don’t need a VPN service if they aren’t doing anything illegal. But, one should understand that a VPN’s use isn’t limited to bypassing geographical restrictions or changing the IP address. If you’re a person who values privacy and wishes to encrypt the commun
How To Remotely Access Your Computer Using Chrome Remote Desktop

How To Remotely Access Your Computer Using Chrome Remote Desktop

Networking, Useful Applications
In this tutorial, I'll walk you through how Chrome Remote desktop works, and how you can use it to remotely access your PC or Mac no matter where you are. A Word on Security Making your computer accessible remotely might sounds like a security risk, but it's actually quite safe. Chrome Remote Desktop is protected by a PIN when used among your own computers and is dependent on an Access Code when opening up your computer to another user. Only you know your PIN, and the Access Code expires at the end of the Remote Assistance session. An unused code will expire after a few minutes if it’s not used, providing further protection, so you can feel quite safe using Chrome Remote Desktop to remotely access your computer. Plus, the entire remote session is AES encrypted over a secure SSL connectio
VPN vs Proxy Server: What’s The Difference? Which One Should I Use?

VPN vs Proxy Server: What’s The Difference? Which One Should I Use?

Concepts, Networking
These days the news headlines are filled with the privacy risks posed by our own governments, hackers, malware, and others. Couple these risks with the staggering amount of data being collected by Google, Facebook, NSA, etc. and you’ve got a perfect recipe for a compromised internet experience. That’s why, in such times, use of advanced security mechanisms has become necessary.  Whenever we talk about privacy, we often talk about services like VPN, Tor, proxies, etc. In the past, we’ve already covered the Tor vs VPN topic, so, here I’m going to outline the difference between VPN and Proxies in this VPN vs Proxy Server article.  VPN vs Proxy Server: Explained Without a doubt, you must be knowing that VPNs and proxies are dedicated to keep you anonymous and enhance the level o