Computers interact with the Internet through a variety of pathways known as "ports". Keeping these ports or doorways on your computer closed to intruders and to malware is an essential part of Internet security. This article explains what ports are, the role of firewalls in protecting them, and how to test them for security.
Understanding and Making Better Use of the Internet
The Internet has become an essential part of the basic infrastructure of a modern society. Using the Web and e-mail are probably the biggest reasons for the average PC user to have a computer. On this page are articles and tutorials to help you get more out of the Internet and to better protect your system from possible Internet hazards.
Unfortunately, there are dangers on the Internet. Like all activity involving large numbers of people, there are crooks and charlatans, thugs and sociopaths among the participants. Out of the hundreds of millions involved, some are bound to be not very nice people engaged in not so honorable pursuits. Also the software companies have tended to neglect security measures for the sake of convenience and ease of use. A locked door is not as easy to use as an open one. The bad news is that unscrupulous and just plain malicious types are taking advantage of unwary PC users. The good news is that common sense and some precautionary steps will suffice to protect most home computer users.
Read an article describing the steps that everyone should take to ensure the safety of their computer. Anti-virus programs, firewalls, spyware and Trojan removers, Windows updates, and system configuration are discussed.
In order for computers to communicate with one another, standard methods of information transfer and processing have been devised. These are referred to as "protocols" and some of the more common ones such as TCP, IP, UDP, POP, SMTP, HTTP, and FTP are discussed here.
Windows XP has a local cache for resolved DNS addresses. This article explains how to configure it to make browsing faster.
The struggle between Internet marketers and viewers who wish to keep their Web surfing habits private has escalated again. The latest technological trick of Internet marketing is called a Flash cookie. Read about it here.
A privacy settings file in a special XML format can be imported into Internet Explorer 6 to customize and fine-tune the control of cookies. This article discusses this easily applied method and gives an example. A second article discusses the structure and creation of a privacy file
One of the recurring problems that home PC users seem to have is being unable to open certain email attachments. This article explains what to do when that happens.
How to guard against phishing and malware sites with browser site filters is described for Internet Explorer 8 and Firefox 3.6*.
How computer firewalls use packet filtering and packet inspection to protect your system frpm intruders and malware.
Want to know the difference between a virus and a worm or what a Trojan horse is? Here's how to find out what these and other Internet menaces do.