Enter your Keyword, Search here,

How to secure hide/unhide folders on Personal Computer

This is very helpful to hide and secure your personal data from other users, particularly on home computer. Just imagine if multiple users are using the same computer at home or in office environment then there is no any 100% secure method to protect your personal files. You may be used any third party tools to protect your folders but it is not recommended by Microsoft to use such kinds of tools. Using built-in windows (XP, 2003, Vista) Attrib commands option, you can change the attributes of a folder (Read only, Hidden and System attributes) and safe your data.

Follow the given steps to edit the folders attributes to secure your data:

To enable this feature, you will need to be logged into your computer with administrative rights, then create a folder that you want to hide on any computer drive. (For example, you have created a folder on D:\ drive with the name Pictures)

Then go to run command from start and type cmd then press enter.When the command prompt opens,then type the command attrib +s +h D:\Pictures and press Enter button to execute it.

This command will hide your "Pictures" folder from D:\ drive and now you can verify it.

Any one can not unhide this folder using windows Show hidden files and folders option also.

When you want to unhide this folder, again open command prompt and type the command attrib -s -h D:\Pictures and press Enter button. If you want to hide files then simply move all these files to this "Pictures" folder.

Related:

How to shutdown your System remotely?

“SHUTCMD.EXE” utility that you can use to shutdown or restart your local or remote computer. You must first logon to the computer that you're trying to reboot.

You can shutdown the local computer by running this command:


SHUTCMD /L

To shutdown a computer on your network ("SERVER" the name of the computer you want to shutdown):

SHUTCMD \\SERVER /Y

To shutdown a remote computer connected to the Internet ("131.200.1.1" being the IP address of that computer you want to shutdown).

SHUTCMD \\131.200.1.1 /Y

For Example,
To shut down the local computer in two minutes and display a "The computer is shutting down" message, use the following line in a batch file or type it at a command prompt, and then press ENTER:
shutdown /l /t:120 "The computer is shutting down" /y /c
To cancel the shutdown process, type the following line at the command prompt, and then press ENTER:
shutdown /l /a /y
• To shut down and restart a remote computer named "Support," use the following line in a batch file or type it at a command prompt, and then press ENTER:
shutdown \\support /r
• To schedule the local computer to shutdown and restart at 10:00 P.M., type the following line at a command prompt, and then press ENTER:
at 22:00 shutdown /l /r /y /c
• To schedule the local computer to shutdown and restart at 6:00 P.M. every weekday, type the following line at a command prompt, and then press ENTER:
at 18:00 /every:M,T,W,Th,F shutdown /l /r /y /c

Related:

Computer Firewalls

Firewalls make it possible to filter incoming and outgoing traffic that flows through your system. A firewall can use one or more sets of “rules” to inspect the network packets as they come in or go out of your network connections and either allows the traffic through or blocks it. The rules of a firewall can inspect one or more characteristics of the packets, including but not limited to the protocol type, the source or destination host address, and the source or destination port.

Firewalls can greatly enhance the security of a host or a network. They can be used to do one or more of the following things:

To protect and insulate the applications, services and machines of your internal network from unwanted traffic coming in from the public Internet.

To limit or disable access from hosts of the internal network to services of the public Internet.

To support network address translation (NAT), which allows your internal network to use private IP addresses and share a single connection to the public Internet (either with a single IP address or by a shared pool of automatically assigned public addresses).

Types of Firewalls

There are two basic ways to create firewall rulesets: “inclusive” or “exclusive”. An exclusive firewall allows all traffic through except for the traffic matching the ruleset. An inclusive firewall does the reverse. It only allows traffic matching the rules through and blocks everything else.

Inclusive firewalls are generally safer than exclusive firewalls because they significantly reduce the risk of allowing unwanted traffic to pass through the firewall.

Security can be tightened further using a “stateful firewall”. With a stateful firewall the firewall keeps track of which connections are opened through the firewall and will only allow traffic through which either matches an existing connection or opens a new one. The disadvantage of a stateful firewall is that it can be vulnerable to Denial of Service (DoS) attacks if a lot of new connections are opened very fast. With most firewalls it is possible to use a combination of stateful and non-stateful behavior to make an optimal firewall for the site.

Network layer and packet filters

Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. The firewall administrator may define the rules; or default rules may apply. The term "packet filter" originated in the context of BSD operating systems.

Application layer firewall

An application layer firewall is a firewall operating at the application layer of a protocol stack.[1] Generally it is a host using various forms of proxy servers to proxy traffic instead of routing it. As it works on the application layer, it may inspect the contents of the traffic, blocking what the firewall administrator views as inappropriate content, such as certain websites, viruses, attempts to exploit known logical flaws in client software, and so forth.

An application layer firewall does not route traffic on the network layer. All traffic stops at the firewall which may initiate its own connections if the traffic satisfies the rules.

Proxy server

In computer networks, a proxy server is a server (a computer system or an application program) which services the requests of its clients by forwarding requests to other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server provides the resource by connecting to the specified server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it would 'cache' the first request to the remote server, so it could save the information for later, and make everything as fast as possible.

A proxy server that passes all requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.

A proxy server can be placed in the user's local computer or at specific key points between the user and the destination servers or the Internet.

Network address translation

In computer networking, network address translation (NAT) is the process of modifying network address information in datagram packet headers while in transit across a traffic routing device for the purpose of remapping a given address space into another.

Top Firewall Security for your Computer

http://www.all-internet-security.com/top_10_firewall_software.html

Related:

Virus, Worms and Trojans

A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The term comes from the a Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.

Trojan horses are broken down in classification based on how they breach systems and the damage they cause. The seven main types of Trojan horses are:
Remote Access Trojans
Data Sending Trojans
Destructive Trojans
Proxy Trojans
FTP Trojans
security software disabler Trojans
denial-of-service attack (DoS) Trojans

what is known as a Trojan horse is a destructive program disguised as a simple application or useful program. The program contains additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data. Though lumped in with viruses, it doesn't propagate itself like a virus does.

One of the worst kinds of Trojans is a program that claims to rid your computer of viruses but instead puts them on your computer. Another common type will open a security hole for a hacker to get into your system and do all kinds of nasty stuff

You can prevent getting a Trojan Horse by having up-to-date anti-virus software, not opening unsolicited attachments, and scanning freeware and shareware you download before you unzip.

A computer virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Much like human viruses, computer viruses can range in severity: Some viruses cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.

A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In more recent worm attacks such as the much-talked-about .Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. Key Terms To Understanding Computer Viruses:

Virus
A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

Trojan Horse
A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves

Worm
A program or algorithm that replicates itself over a computer network and usually performs malicious actions

Blended threat
Blended threats combine the characteristics of viruses, worms, Trojan Horses, and malicious code with server and Internet vulnerabilities .

Antivirus program
A utility that searches a hard disk for viruses and removes any that are found.


A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

Added into the mix, we also have what is called a blended threat. A blended threat is a sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one threat. Blended threats use server and Internet vulnerabilities to initiate, transmit and spread an attack. This combination of method and techniques means blended threats can spread quickly and cause widespread damage. Characteristics of blended threats include: causes harm, propagates by multiple methods, attacks from multiple points and exploits vulnerabilities.

To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For examplem it wouldn't just launch a DoS attack — it would also install a backdoor and damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. For example, a worm may travel through e-mail, but a single blended threat could use multiple routes such as e-mail, IRC and file-sharing sharing networks. The actual attack itself is also not limited to a specific act. For example, rather than a specific attack on predetermined .exe files, a blended thread could modify exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.

Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats require no human intervention to propagate.

Combating Viruses, Worms and Trojan Horses

The first steps to protecting your computer are to ensure your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you should have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses. Additionally, you want to make sure your anti-virus program has the capability to scan e-mail and files as they are downloaded from the Internet. This will help prevent malicious programs from even reaching your computer. You should also install a firewall as well.

A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic. For individual home users, the most popular firewall choice is a software firewall. A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network.

It is important to remember that on its own a firewall is not going to rid you of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network.

What is a Virus? How it Affect your Systems?
A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.

Related:







How to get access to the restricted or banned webpages over internet?

You can access the restricted or banned websites with the help of this tip. You may have problems to accessing your favorite's politics, news, and sexy websites in your office and other public places. Some time these websites banned by Government, ISP and may be by your office network administrator. This tip is very useful, if you are using internet particularly in school, college and office.

Follow the given points to access the banned website:
Technique 1: Search the banned website, for example www.downloads.com in Google and yahoo search engine then open the cached copy of that page to access the website. You can get also cache link of that website, if you search in Google with keyword cache:URL name and get cache link to access the website.



Technique 2: Another method to access the banned website using its IP address, because you can open the website with IP address instead of actual URL name. This technique bypasses the URL based restrictions. For example if www.myspace.com is banned in your school, you can open it using IP address 216.178.32.51. You can search online IP conversion tools to get IP address of any website.

Technique 3: There are some mini web browsers can help you to open the banned websites, for example Opera Mini Browser, install it and try to open any banned website. Another Real Player browser can successfully help you to access the banned website. This Real Player browser bypasses the many restrictions of website banned tools.

Technique 4: There any many websites Anonymizer tools are available to fetch the banned website. These anonymous surfing tools that protect your identity on the internet and give the access to banned sites. As far as the service provider is concerned you are viewing a page from Anonymizer and not the blocked site.

These tips are very useful to access the banned websites in your university, cybercaf� ,office and other public places.

Related: Read more!!

More Posts that you may be interested...