PeerBlock lets you control who your computer "talks to" on the Internet. By selecting appropriate lists of "known bad" computers, you can block communication with advertising or spyware oriented servers, computers monitoring your p2p activities, computers which have been "hacked", even entire countries! They can't get in to your computer, and your computer won't try to send them anything either.
And best of all, it's free!
This software will protect those torrent users out there from Ads, Malicious spyware sites, “bad P2P sites” caugh caugh!!! Block annoying video ads on sites that load up automatically as well as has a blacklist you can configure.and help you stay secure on the web none the less. If you are reading this you probably already know the best use of this software so go ahead and download it. The set up is easy and only takes a second. It’s a little piece of mind that you probably didn’t have before.
Download Page: http://www.peerblock.com/
Thanks to http://geekblog.tv for this find..
Most of the people have autorun issues with their flash/hard drives.It is because of the modification of the autorun.inf file in the root directory which is in most cases hidden and cant be seen. So you just have to create a bat file with the following syntax as mentioned below. Copy and paste this into Notepad and save it as AV.bat or whatever.bat ..
Clean Area...
A lot of them may have experienced leechers or have leeched themselves through an open network. An easy way to prevent that from happening is to encrypt your network traffic. One of these methods is by use of WEP or Wired Equivalent Privacy. I’m going to talk about why you shouldn’t use WEP and how easy it is to crack....
A virtual private network (VPN) is a secure way of connecting to a private Local Area Network at a remote location, using the Internet or any insecure public network to transport the network data packets privately, using encryption. The VPN uses authentication to deny access to unauthorized users, and encryption to prevent unauthorized users from reading the private network packets...
0 Connection:
Post a Comment