Advert

How to Erase Browser History

Last edited by . Total of no comments in the discussion.

Erasing browser history clears the record of what web sites the user visited over a period of time. This can help to protect privacy by preventing others from monitoring what web sites the user has been visiting. Erasing Internet Explorer’s Browser History By default, Internet Explorer keeps browser history for 20 days. To erase browser history in Internet Explorer, follow these steps: Open the Tools menu from the toolbar. Select Internet Options from the Tools Menu. Click the Clear History button. Click the Yes button on confirmation.   Erasing Firefox’s Read More

Share on:

How to Setup a Proxy Server

Last edited by . Total of 13 comments in the discussion.
Proxy Setup

A proxy server is one that receives requests intended for another server and that acts on the behalf of the client (as the client proxy) to obtain the requested service. It is often used when the client and the server are incompatible for direct connection. For example, the client may be unable to meet the security authentication requirements of the server but may be required to access some services. It may also be used for screening purposes to enable the administrator to control access to undesirable sites. The proxy server Read More

Share on:

Key Logger

Last edited by . Total of 1 comment in the discussion.

A key logger, or keystroke logger, is a piece or hardware of software which records user keystrokes. They can be used for legitimate purposes such as checking a minor child’s Internet and email use or for illegal tasks such as stealing email and bank account login and password data. Keyboard loggers use keylogging technology to record keys that are typed on a computer keyboard, and even take screen shots of the computer when in use. Hardware Key Loggers A hardware key logger is a small piece of hardware which is Read More

Share on:

What Are RFID Blockers?

Last edited by . Total of no comments in the discussion.

RFID (Radio Frequency Identification) is a tracking method that uses RFID tags and readers to determine an item’s exact location within a specific area. RFID is cost effective and does not interfere with the daily routines of customers and employees. Since RFID is so simple, it is widely implemented in retail outlets and grocery stores to prevent theft. RFID is also used to locate employees and prevent unauthorized personnel from entering restricted areas. In order to prevent RFID from working properly, however, many manufacturers have produced “RFID blockers” that are Read More

Share on:

SSH (Secure Shell)

Last edited by . Total of no comments in the discussion.

SSH (Secure Shell) is a protocol for creating a secure connection between two computers. The secure SSH connection provides authentication and encryption. SSH also provides compression. The SSH protocol is defined by the IETF Secure Shell Working Group(secsh). SSH was designed as a replacement for the legacy `telnet` application. The computer being connected to must be running an ssh daemon, or server, process. The computer which is attempting to connect must be running an SSH client. SCP and SFTP – Secure File Transfer Using SSH SCP and SFTP are replacements Read More

Share on:

Some Free Key Loggers

Last edited by . Total of no comments in the discussion.

Key loggers are handy software programs that allow you to monitor activity with a particular workstation or even a network of workstations. Key loggers were originally designed to capture keystrokes computer keyboard and record them on a file for later review. Newer key loggers also capture textual information in a window, or on the screen as it is displayed. There are a number of free key logger software packages available on the Internet. The Purpose of Key Loggers Key loggers are helpful at home and at the office. For home Read More

Share on:

How to Delete Search History

Last edited by . Total of 2 comments in the discussion.

  For many computer users privacy is important. If you use a computer for searching the web, there may be times when you prefer to not leave a digital trail of the sites you visited. For those looking to delete their search history, you should know it is extremely easy, here are some tips. Deleting Your Search History Using Internet Explorer Open up Internet Explorer and click on Tools, you should see at the top the option “Delete Browsing History”. Click on this option and a menu should appear giving Read More

Share on:

How to Fake Mail

Last edited by . Total of 1 comment in the discussion.

Fake mail is e-mail which appears to be from someone other than the actual sender. Fake mail was initially usually used to stage practical jokes, but is now utilized primarily by e-mail spammers. How to Send Fake Mail To send fake mail, first `telnet` to port 25 of the machine you want the fake mail to appear to originate from. This will connect you directly to the SMTP (Simple Mail Transfer Protocol) daemon running on that host. Next, enter SMTP commands by typing them directly to the SMTP daemon. Enter Read More

Share on:

How to Clear MSN Search History

Last edited by . Total of no comments in the discussion.

When using MSN and doing a search, you are using the Bing software which is Microsoft’s search engine. However, one of the things that you might want to do is clear your search history. Perhaps you were searching fro something on a computer that you don’t want anyone to know. Maybe you just don’t want the clutter. Regardless, clearing your MSN search history isn’t very difficult. There are two routes. The first route is very straight forward and takes about five seconds. This route has a sub-route that allows you Read More

Share on:

How to Clean Porn from a Computer

Last edited by . Total of no comments in the discussion.

Virtually every computer in the world has some form of adult pornography stored somewhere on its hard drive. This can be due to personal use, viruses, or the fact that pornography seems to be included with every downloaded file, opened webpage, and email attachment. Pornography can also be a concern when many people have access to the same computer, as can be seen with public computers or home computers that are not password protected. However, traces of pornography can be embarrassing and harmful to the user’s personal, social, and work Read More

Share on: