How To Remove Spyware Clean Up Security Tool

why you should be eliminated? Instead Security Tool is a tool that innate rather than Windows? Yes, initially looked like hell so, I also had nearly fooled initially. Security Tool is actually a spyware (malicious viruses) that aims to steal sensitive data we like usernames, passwords and credit card.

Well, this spyware pretending to be anti-spyware tool that works to clean up our computers. And that's a fake! Security Tool displays an error message that your computer is infected with viruses, spyware and malware is dangerous, and we are required to "clean up". Though the files mentioned that in normal circumstances. Anyway, do not believe in anything that is said by the Security Tool.

sharing Internet In Linux Redhat

At up to this stage, is the end of the process for ICS on your Local Network. Here is not too long because only one line of command used to open your Internet sharing to your clients. Well let us directly trace why until only 1 (one) line just ordered.

To make sharing basically for the layman does not understand and feel hard, is actually just very simple. Note the following command


Configuration Firewall IPTABLES on REDHAT 9 SEVER

What is the function of IPTABLES and mean?, IPTABLES FIREWALL itself to function properly and indeed he was a FIREWALL standard or default when you install Linux. You just have to give a sign of Check Up LINUX install time to install it for all. And what is meant IPTABLES? IPTABLES is a series of commands that are prepared or modified manually or by our own so that the formation of a Network Protection. Well I think the purpose and function is clear enough, let's see how to configure IPTABLES itself. Here I will only menjeleskan little and as quickly as possible, to further please your search Ebooksnya in or I'll write the next tutorial is complete and clear, here are described only for Ethernet and ICS alone. Well let's get straight to the main discussion.

Configuring Static IP Address for ICS

Now let us explain how to configure Static IP Address in order for setting up ICS later.

Here is described how to setup a static IP, why static? because we use the Intranet network to local network, it would be nice if we use a static IP for ICS later, other than that we will easily men setup IP-IP in the future with an IP client that sorted and easy to remember.

To set up IP make sure you login with root, after you login with the root lets men setup. It is very easy; first make sure the IP format to your server or computer is saying that there is a modem to split the ICS on the client. Here we use the IP as the format of this explanation, and for the client in accordance with the amount of your client.

Well, now your server IP already determined is not it? Well, let's set up this IP, the way will be described with a picture I'll be easier for the beginner. :) Click the "Start Application" on your desktop, then selects "System Settings" and then select again the "Network" is for RH 9. After that will open the window "Network Configuration", as in the picture below, (figure 1.1)

 Figure 1.1

Once the window "Network Configuration” window opens selects the TAB "Devices" then click the "Edit" to fill in your IP address. Usually if you just install Linux now, defaults to using "DHCP IP Address" whereas here you have to use Static IP Internet connection to share an Ethernet network in your View (Figure 1.2).

Figure 1.2

Well let us set up IP, select the "Statically Set IP Address" then you will be asked to fill in all text fields there. This is because the server then it is advisable to start from to facilitate you in mengurutnya (It can also optionally if so enter the IP addresses in the "Address " and then you have to fill out the "Subnet Mask" her in because this IP in Class C Subnet Masknya then of course is, well fill in the Subnet Masknya when filled with either do not forget to fill out the "Default Gateway Address". At Gateway is usually a gateway from your ISP.

If your ISP is more than 1 (one) then it does not influence what you fill in the "Default Gateway Address" is. To this will be explained further later on, after all filled with good and right click on the "OK" to return to the "Network Configuration" is as in Figure 1.1.

Then the next step select the TAB "DNS" here would be no "Hostname" from your server computer, if you intend to change this please do not affect the ICS route later. In TAB "control" you have to fill in DNS from your ISP such as Figure 1.3 below, fill in your ISP's DNS in the "Primary DNS" if the ISP you use only 1 (one) and when finished or you have to fill in your ISP's DNS is then Also fill in the sign (.) point on the "DNS Search Path" when this is over also completed the finished charging or Setup your Server IP, now you stay out of the "Network Configuration" and Save after it went into "Terminal" to restart your network with the command "/ ect / rc.d / init.d /. / network restart" when network restarted all have status "OK" if there is a "Failed" means that there's nothing wrong, double check everything. Well all has been well gives a chance to let us go to the following

Figure 1.2

 Figure 1.1

Configuring Ethernet To ICS Server on Linux Redhat 9

  1. Know Your IP Type

    Before we go any further with ICS, it would be nice if we slightly know the types of IP are contained in an Ethernet network. In the network there is in say with Binary IP (BIP) and Dotted Decimal Notation Address (IPDD). What is the difference with Binner Dotted Decimal IP and IP? Actually the difference of the two above is not very far, because both are interrelated. Binary IP is an IP solution from Dot IP. Still confused with the above? Need examples? Well look below the difference of the two.

Cybercrime investigation center beefed up

The prosecution has decided to bolster its cybercrime investigation center to better cope with hacking and other illegalities on the Internet.

It will assign an additional 25 investigators to its cybercrime squad which is currently comprised of eight officers, the Seoul Central District Prosecutors' Office said Sunday.

The cybercrime investigation center tracks down hackers, electronic commerce fraud, the leak of private information, and other crimes that are committed on the Internet.

“We expect this enforcement of investigations will provide a great leverage for the cybercrime investigation center to crack down on all kinds of crimes on the Internet,” a prosecution official said.

Its move comes as the number of cybercrimes jumped to 164,536 cases in 2009 from 136,819 in 2008. 

Article from: The Korea Times
Blogger Templates