Wednesday 21 May 2014

Create Your Own Online Proxy Server (Free)

Is your favorite website blocked in college ? Is it difficult for you to choose the most reliable and trust worthy proxy server ? No worries at all as you can easily create your own proxy server. There are hundreds of PHP scripts available on internet that can be used to create a proxy server for free but they need a web server and a domain name for the proxy site. Never mind, you can still create your own personalized proxy server without purchasing any domain name or web server, with google app engine. You might also be interested in Unblock Torrents in College .

Create-your-own-proxy-server

Three Reasons to Consolidate Your Remote Access Tools

Consolidate your remote access tools.

Remote access solutions have become an integral part of the corporate help desk, which has in turn become saturated with various tools of unique functionality and purpose. To this end, IT decision makers have begun consolidating tools wherever possible. Here are three ways ProxyPro consolidates your remote access needs into one tool that’s fast, reliable, and easy to use.
1. One Interface, Endless Connections – With ProxyPro, IT support technicians have visibility on every machine, whether those lie inside or outside of their network, and can provide support to those workstations within seconds. Using our deployment tool, those same technicians may use ProxyPro to push updates to all machines with the touch of a button. With our web console, users have access to a cloud-based support structure, available anywhere in the world.

Tuesday 20 May 2014

Using the Apache HTTP Server as a forward proxy to the Internet

Often you do not want servers in your internal network segments to be able to access the Internet directly.
One way to get controlled access to the Internet is to place an Apache HTTP Server in a DMZ network segment. Internal servers can then use the Apache server as a forward proxy to the Internet.
It is easy to configure mod_proxy for this purpose. Here is an example.

How To Use Apache HTTP Server As Reverse-Proxy Using mod_proxy Extension

Apache is a tried and tested HTTP server which comes with access to a very wide range of powerful extensions. Although it might not seem like the go-to choice in terms of running a reverse-proxy, system administrators who already depend on Apache for the available rich feature-set can also use it as a gateway to their application servers. In most cases, this will translate to removing an additional layer from their server set up or the need to use yet another tool just to redirect connections.
In this DigitalOcean article, we are going to see set up Apache on Ubuntu 13 and use it as a reverse-proxy to welcome incoming connections and redirect them to application server(s) running on the same network. For this purpose, we are going to use and work with the mod_proxy extension and several other related Apache modules.

HTTP proxy server: what is it?

HTTP proxy server is a proxy, allowing working on the Internet with HTTP and (not always) FTP protocols. It (as well as other proxy servers) can carry out caching of information downloaded from the Internet.
Let's have a more detailed look over its abilities.

Anonymity of HTTP Proxy

HTTP proxy servers have several anonymity levels. It depends on purposes, which a proxy is used for, so an anonymity requirement is not always an essential one.
Conditionally HTTP proxy servers by their anonymity degree could be divided onto:
  1. Transparent - these proxies are not anonymous. They, first, let a web server know that there is used a proxy server and, secondly, give away an IP-address of a client. The task of such proxies, as a rule, is information caching and/or support of Internet access for several computers via single connection.
  2. Anonymous - these proxy servers let a remote computer (web-server) know, that there is used a proxy, however, they do not pass an IP-address of a client.
  3. Distorting - unlike the previous type, they transfer an IP-address to a remote web-server, however, this address is a phantom: randomly generated by a proxy server or any fixed (not your) IP. So, these proxies distort your IP address from the point of view of a web-server.
  4. High anonymous (elite) – they do not send your IP-address to a remote computer. Also, they do not inform that there is used any proxy server! So, a web-server thinks” that it works directly with a client.
This anonymity classification is rather conventional. There are many other classifications, specifying / expanding / generalizing this one.

Proxy traversal

WebSocket protocol client implementations try to detect if the user agent is configured to use a proxy when connecting to destination host and port and, if it is, uses HTTP CONNECT method to set up a persistent tunnel.
While the WebSocket protocol itself is unaware of proxy servers and firewalls, it features an HTTP-compatible handshake so that HTTP servers can share their default HTTP and HTTPS ports (80 and 443) with a WebSocket gateway or server. The WebSocket protocol defines a ws:// and wss:// prefix to indicate a WebSocket and a WebSocket Secure connection, respectively. Both schemes use an HTTP upgrade mechanism to upgrade to the WebSocket protocol. Some proxy servers are transparent and work fine with WebSocket; others will prevent WebSocket from working correctly, causing the connection to fail. In some cases, additional proxy server configuration may be required, and certain proxy servers may need to be upgraded to support WebSocket.

How HTML5 Web Sockets Interact With Proxy Servers - Part 1

With the recent explosion of WebSocket server implementations, a lot of questions have come up about how HTML5 Web Sockets deal with proxy servers, firewalls, and load-balancing routers. Will proxy servers automatically kill WebSocket connections? Do HTML5 Web Sockets handle firewalls and proxy server issues better than Comet? Are Web Sockets the silver bullet in seamless proxy server traversal? In this article, I’ll explain how HTML5 Web Sockets interact with proxy servers, load balancing routers, and firewalls. Additionally, I’ll explain how Kaazing WebSocket Gateway and its Web Socket emulation can add additional value.

About HTML5 Web Sockets and Proxy Servers

Let's start with some basic concepts: what exactly are HTML5 Web Sockets and proxy servers?

Routed Mode WanLinks with Virtual Routers


Goal: Setup a Routed Mode WanLink between two Virtual Routers.

In this test scenario, LANforge-ICE is used to simulate a routed network where incoming traffic on one port is sent through one Virtual Router then through a WanLink, then through a second Virtual Router and then finally out to a port on a different network.



Setup a Netsmith Connection.


Go to the Status tab and click Netsmith

Monday 19 May 2014

Check if rogue DNSChanger has changed your DNS settings

Domain Name System or the DNS system is an Internet service that converts domain names into numerical Internet protocol (IP) addresses. These numerical IP addresses are used by computers to connect with each other.
When you type a domain name in the address bar of your browser, your computer contacts DNS servers. It then finds out the IP address for that website. Once this is done, your computer then uses this IP address to connect to the website.
dns changer 600x233 Check if rogue DNSChanger has changed your DNS settings

Manage web browsing speed by changing DNS settings

DNS or Domain Name System, helps resolve the name of any web address. When you type a domain name in your browsers address bar, say www.TheWindowsClub.com, your computer resolves this name into the IP address of the Internet server, where the site is hosted, using the Internet Protocol.
The Windows operating system, is set by default, to automatically use the DNS server of your ISP or Internet Service Provider.
A slow DNS server could be one cause for poor web browsing speed. If your ISP’s DNS server is slow, or responds slowly, or at times is overloaded, it may cause an additional delay of a few seconds, every time you go on to load a new web page.
While is most cases, keeping the default option is a good idea, if you find that your default DNS provider is slow, you may want to consider finding one that is fast. To test the response time for your DNS server, you can use Dig. It is important to know that what may be good for one person in one part of the world may not necessarily be good for another person sitting in another part of the world.

How to change DNS settings in Windows 7 | 8

Most are aware that Google Public DNS has been recently launched. If you wish, you can override the default DNS (Domain Name Server) settings on your computer so you can specify which DNS server is used, or which IP address should be used for a particular domain.
dnssettings 600x480 How to change DNS settings in Windows 7 | 8

Manage Different Profiles with Pre-configured IP Settings Using TCP/IP Manager

There are some really good programs that make managing different set of profiles with pre-configured IP settings a breeze. TCP/IP Manager is one amongst them. The program has the ability to manage up to 10 different profiles with individual TCP/IP settings and no matter where you are, at home or at work it tracks network configuration at various locations.
TCP/IP Manager can be downloaded for free and consumes less than 500KB of your hard disk space. It is an open-source tool that makes changing network settings a one-click operation.
You all will agree that it is not only tiring but a time-consuming task to manually change the TCP/IP network settings every time you switch to a different environment. Say you are in your office then switching to your office network from home network may require different DNS setting. Moreover, you will have to type/enter the IP address, Subnet mask, default gateway and DSN one by one thereby wasting your time and energy.
So, why not have a utility that simply allows users to copy and paste the respective network IP addresses directly and eliminate the need of re-typing unnecessarily? And TCP/IP Manager does exactly this! Besides, it also provides the option to choose specific profile and minimize it to the system tray so that it can be accessed later whenever required by simply clicking on the system tray icon.

What are DNS and the DNS Proxy?


The DNS (domain name system) is a network system of servers that translates numeric IP addresses into readable, hierarchical Internet addresses, and vice versa. This is what allows your computer network to understand that you want to reach the server at 192.168.100.1 (for example) when you type into your browser a domain name such as www.watchguard.com.

How to Flush Windows DNS Cache

Internet connection problems? DNS cache corrupted? Maybe you need to flush Windows DNS Cache. If your computer is finding it difficult to reach a certain web site or server, the problem may be due to a corrupt local DNS cache. Sometimes bad results are cached and therefore need to be cleared from the cache in order to allow your Windows computer to communicate with the host correctly.
Typically, there are 3 types of caches in Windows which you can flush easily:
  1. Memory Cache
  2. DNS Cache
  3. Thumbnails Cache
Clearing the Memory Cache can free up some system memory while clearing the Thumbnail Cache can free up space in your hard disk. Clearing the DNS Cache can fix your internet connection problem. Here’s how you can flush the DNS cache in Windows 8 or Windows 7.

NetSetMan: Network Settings Manager for Windows 8

NetSetMan: Network Settings Manager for Windows 8

NetSetMan is a very useful utility to manage different network settings like IP address, DNS, etc. It can easily be used to switch between 6 different profiles including IP address, subnet mask, default gateway, DNS server, Win server, computer name, printer, DNS domain, work group, and scripts. This is especially useful for Laptop users who switch between different profiles like Office, Home, etc. Instead of manually configuring the settings you can just setup everything once and use the profile when you need it.
netsetman 600x439 NetSetMan: Network Settings Manager for Windows 8

How to Setup Proxy for Metro application in Windows 8

Today, we’ll discuss how to enable or configure Proxy Server for Metro applications in Windows 8. By default we can setup Proxy for Internet Explorer, but for some reason it’s not working correctly for Metro application. When I tried it initially, I received the following error: Your PC isn’t connected to the Internet. To use the Store, connect to the Internet and then try again.
After searching online for a while I found some working methods. One is to use the Netsh command and import proxy settings from Internet Explorer to WinHTTP and the other is tomanually configure the Proxy settings the same way as in Windows 7, in the registry or viaGroup Policy settings. You can try any of the 3 methods.

Manually configure Proxy settings

In this method we’ll create a predefined registry configuration and import into registry. So first let’s make a backup of your registry.
  • Press Win + R  and type in Regedit
  • Go to File and click on Export
  • Under export range select “All”
image thumb13 How to Setup Proxy for Metro application in Windows 8

How to configure Proxy Server Settings in Windows 8.1

A local Proxy Server can improve the throughput of your broadband connection and at times even provide protection against malware infections. Therefore Proxy settings have a key role to play. These settings let a browser know the network address of an intermediary server used between the browser and the Internet on some networks (local).
Normally, you change the proxy settings only when you are connecting to the Internet through a corporate network. By default, browsers such as Internet Explorer automatically detects proxy settings. However, you might need to manually set a proxy with information supplied by your network administrator. Microsoft seems to have offered an alternative option here via Windows 8.1 upgrade – as different from in Windows 8. One of the biggest additions to the Windows 8.1 settings and upgrade is the proxy settings. This makes it much easier to configure automatic and manual proxies in Windows 8.1.

Configure Proxy Server Settings in Windows 8.1

To configure the proxy settings in Windows 8.1, first bring up the charms-bar by pointing the mouse cursor to the lower-left corner of your computer screen or by using Keyboard shortcut – Win+C. Choose ‘Settings’ icon and select the ‘Change PC Settings’ option.
change PC settings1 How to configure Proxy Server Settings in Windows 8.1

Troubleshooting Internet Connectivity Problems

Test Internet Connectivity

Open the Internet Connectivity Preferences dialog and use the Test Internet Connectivity button. Make sure that the box marked Allow Mathematica to Access the Internet is checked.
If the test succeeds, then Mathematica is correctly configured for internet access, and the problem lies elsewhere, such as a problem with your network configuration.
If the test fails, note how long it took. If there was a minutes-long delay, skip to "Check Your Proxy Settings" for troubleshooting information.

Check Whether Your Web Browser Works

If your web browser does not work, there might be a network problem. To test whether your browser works, make sure to load an uncached page, or use Shift+Reload to force-reload a cached page.

Reverse proxy

In computer networks, a reverse proxy is a type of proxy server that retrieves resources on behalf of a client from one or more servers. These resources are then returned to the client as though they originated from the server itself (or servers themselves). While a forward proxy acts as an intermediary for its (usually nearby) associated clients and returns to them resources accessible on the Internet, a reverse proxy acts as an intermediary for its (usually nearby) associated servers and only returns resources provided by those associated servers.

Uses of reverse proxies

  • Reverse proxies can hide the existence and characteristics of an origin server or servers.
  • Application firewall features can protect against common web-based attacks. Without a reverse proxy, removing malware or initiating takedowns, for example, can become difficult.
  • In the case of secure websites, a web server may not perform SSL encryption itself, but instead offloads the task to a reverse proxy that may be equipped with SSL acceleration hardware. (See SSL termination proxy.)

Load balancing (computing)

Load balancing is a computer networking method for distributing workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units or disk drives. Load balancing aims to optimize resource use, maximize throughput, minimize response time, and avoid overload of any one of the resources. Using multiple components with load balancing instead of a single component may increase reliability through redundancy. Load balancing is usually provided by dedicated software or hardware, such as a multilayer switch or a Domain Name System server process.

Internet-based services

One of the most commonly used applications of load balancing is to provide a single Internet service from multiple servers, sometimes known as a server farm. Commonly, load-balanced systems include popular web sites, large Internet Relay Chatnetworks, high-bandwidth File Transfer Protocol sites, Network News Transfer Protocol (NNTP) servers and Domain Name System (DNS) servers. Lately, some load balancers have evolved to support databases; these are called database load balancers.

Net neutrality: what is it and why does it matter?

The FCC meets Thursday to discuss new rules for regulating the web. James Ball explains the latest challenge to net neutrality
Ethernet cables

The new rules would introduce an effective competition test which sets a bar ISPs have to pass in order to prioritise particular traffic. Photo: Lukas Coh /AAP Image
The Federal Communications Commission (FCC) meets Thursday to discuss new rules for regulating the internet, bringing the debate about “net neutrality” back to the fore. The FCC was forced to rewrite the rules after its old ones were overturned in January following a court battle with Verizon. Protesters are camping out outside the FCC's offices and some of the world's biggest tech firms have written to the regulator expressing concern that the proposals leaked so far offer a “grave threat to the internet.”

4 Innovative Ways Startups Are Using Leap Motion

Leapmotion-demo-day

When Leap Motion first launched its gesture-based controller, many wondered whether the device would have many practical applications, beyond games and gimmicky apps.
A lot has changed in the past year since we first saw the Leap Motion controller, which enables users to control and interact with screens through hand gestures alone.
If anyone still has reservations about the potential of Leap's platform to change lives, the Leap AXLR8R is here to disprove that. The startup accelerator, backed by SOS Ventures, has been working with a handful of startups to build new tools and applications with Leap Motion.

Does Disabling DHCP on Your Router Really Help Your Security?

Unless you’re hooking up one single computer to an Ethernet-based Internet connection, there’s a router somewhere between every device you use and the World Wide Web. You depend on this router to keep you safe, but its default settings might not always be the most optimal to harbor a secure environment. Some sites are telling their readers now that disabling DHCP and configuring a static IP on each device is a significant step in the process of ensuring your security. But does this really help you?
If you’re a bit confused right now, don’t feel bad. It’s not like the average Internet user has to know what the dynamic host configuration protocol (DHCP) is. But that’s why we’re here!
DHCP, in short, is the protocol your router uses to automatically give each of your connected devices an IP. If your router’s IP is 192.168.0.1, the first computer you connect to it may be assigned the IP of 192.168.0.2. Next in line is 192.168.0.3, and so on, and so forth. Your devices may not always have the same IP since the router just plops whatever IP number it wants on a first-come, first-serve basis. That’s what the “dynamic” part of DHCP represents. Your IP may change at any point.

Saturday 17 May 2014

How To Create Your Own Online Proxy Server In Minutes

I had quite a lot of trouble last week with a company’s browsing restrictions. It used an extensive directory of ‘forbidden websites’ that kept out all but a few popular sites. In effect, no games sites, no personal email, and no MakeUseOf.
None of the conventional proxy servers worked, and even Google Translate failed. My hopes were down until, yesterday, I discovered that one of my personal domains could be accessed.
Back on my home computer, in a matter of minutes, I had set up my own functioning proxy server. With the instructions below, so can you.

How To Make Your Own Proxy Using Google App Engine

Educational institutions, organizations, and even Internet Service Providers (ISPs) try their best to restrict access to many websites for a variety of reasons. But if you believe that you should be allowed to browse any site of your choice, a proxy can help you access sites blocked by a firewall on your network.
There are various proxies available on the web which can be used to access restricted websites but the problem here is that network administrators can block access to these proxies, so we are back to square one with this. The solution? Getting your own proxy to browse the Web openly.
A proxy opens blocked and restricted websites, and lets you access any website of your choice even behind the firewalls. You can create your own proxy using Google App Engine (GAE). GAE provides a bandwidth quota of 1 GB/day for free, which is more than enough for browsing websites.
It’s a very simple process involving only four tasks, and it costs absolutely nothing. Administrators use various lists to block proxies and other websites, but that list most probably won’t contain your proxy, thereby allowing you free rein.

How to Setup your own Proxy Server for Free

 Doa Google search like “proxy servers” and you’ll find dozens ofPHP proxy scripts on the Internet that will help you create your own proxy servers in minutes for free. The only limitation with PHP based proxies is that they require a web server (to host and run the proxy scripts) and you also need a domain name that will act as an address for your proxy site.
If you don’t have a web domain or haven’t rented any server space, you can still create a personal proxy server for free and that too without requiring any technical knowledge.

How to Make a Proxy Application/Proxy Website

Need to visit some websites while at work or school, but the boss has blocked all the good ones? You can use your own proxy server to bypass this, and it'll even have a GUI (Graphical User Interface)!

Steps

  1. 1
    Install a web server. You're going to first need to install a web server. A favorite for casual users is WAMP because of its simplicity and easy management. You can find it here: http://www.wampserver.com/en/ After you've downloaded the WAMP server, install it (you may need administrator privileges on the computer you are installing it on). Restart the computer when the installation is complete.

Turning on Group Policy to configure a Web proxy

Log on to a server in the domain, and with administrative permissions, open up Start > Programs > Administrative Tools > Active Directory Users & Computers and expand your domain.
2.
Create a GPO and give it a meaningful name (Cloud Web Security, for example).
3.
Edit the GPO from the following location. User configuration > Windows Settings > Internet Explorer Maintenance > Connection > Automatic Browser Configuration.

How to Configure Proxy Settings Using Group Policy Management

To configure proxy settings using Group Policy Management with the Barracuda Web Security Service, first configure your group policy object using the Microsoft Group Policy Management Tool. Click Start > A4 >Programs > Administrative Tools > Group Policy Management.

Using the Microsoft Group Policy Management Tool

Create a New Group Policy Object (GPO)
  1. In the Group Policy Management window, under Domains, right-click the domain name.
  2. Select Create and Link a GPO Here. The New GPO window appears.
  3. Enter an intuitive Name for the GPO, such as Web Security Service Proxy Policy.
  4. Click OK.

Friday 16 May 2014

Firewall Configuration

Firewalls are customizable. This means that you can add or remove filters based on several conditions. Some of these are:
IP addresses - Each machine on the Internet is assigned a unique address called an IP address. IP addresses are 32-bit numbers, normally expressed as four "octets" in a "dotted decimal number." A typical IP address looks like this: 216.27.61.137. For example, if a certain IP address outside the company is reading too many files from a server, the firewall can block all traffic to or from that IP address.
Domain names - Because it is hard to remember the string of numbers that make up an IP address, and because IP addresses sometimes need to change, all servers on the Internet also have human-readable names, called domain names. For example, it is easier for most of us to remember www.howstuffworks.com than it is to remember 216.27.61.137. A company might block all access to certain domain names, or allow access only to specific domain names. Protocols - The protocol is the pre-defined way that someone who wants to use a service talks with that service. The "someone" could be a person, but more often it is a computer program like a Web browser. Protocols are often text, and simply describe how the client and server will have their conversation. The http in the Web's protocol. Some common protocols that you can set firewall filters for include:

What Firewall Software Does

A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through.

If you have read the article How Web Servers Work, then you know a good bit about how data moves on the Internet, and you can easily see how a firewall helps protect computers inside a large company. Let's say that you work at a company with 500 employees. The company will therefore have hundreds of computers that all have network cards connecting them together. In addition, the company will have one or more connections to the Internet through something like T1 or T3 lines. Without a firewall in place, all of those hundreds of computers are directly accessible to anyone on the Internet. A person who knows what he or she is doing can probe those computers, try to make FTP connections to them, try to make telnet connections to them and so on. If one employee makes a mistake and leaves a security hole, hackers can get to the machine and exploit the hole.

How Firewalls Work

Proxy Servers and DMZ

A function that is often combined with a firewall is a proxy server. The proxy server is used to access Web pages by the other computers. When another computer requests a Web page, it is retrieved by the proxy server and then sent to the requesting computer. The net effect of this action is that the remote computer hosting the Web page never comes into direct contact with anything on your home network, other than the proxy server.
Proxy servers can also make your Internet access work more efficiently. If you access a page on a Web site, it is cached (stored) on the proxy server. This means that the next time you go back to that page, it normally doesn't have to load again from the Web site. Instead it loads instantaneously from the proxy server.
There are times that you may want remote users to have access to items on your network. Some examples are:
  • Web site
  • Online business
  • FTP download and upload area
In cases like this, you may want to create a DMZ (Demilitarized Zone). Although this sounds pretty serious, it really is just an area that is outside the firewall. Think of DMZ as the front yard of your house. It belongs to you and you may put some things there, but you would put anything valuable inside the house where it can be properly secured.
Setting up a DMZ is very easy. If you have multiple computers, you can choose to simply place one of the computers between the Internet connection and the firewall. Most of the software firewalls available will allow you to designate a directory on the gateway computer as a DMZ.
Once you have a firewall in place, you should test it. A great way to do this is to go to www.grc.com and try their free Shields Up! security test. You will get immediate feedback on just how secure your system is!
To know more about proxy see next post ....

Unblock and access Blocked or Restricted Websites

Websites can be blocked at three levels: Computer levelNetwork level or theISP/Governmental level. Some DNS services, such as Open DNS, too provide options to block certain types of websites for different users sharing the computer. Then, there are some software other than the built-in “Restricted Websites” in Internet Options that help in blocking a website. We’ll not be talking about how to block a website. Rather, we’ll focus on how to access a website that is restricted on your workstation by network admins and ISPs (Internet Service Provider).
Access Restricted Websites Unblock and access Blocked or Restricted Websites

How to Block Proxy Websites

Proxy sites are websites most commonly used to bypass internet circumvention. This can pose potential security threats to a network due to viruses and such being tunneled in past active security measures. Blocking these sites is often a desirable action  of IT professionals and network administrators.


  1. Block Proxy Websites Step 1.jpg

Thursday 15 May 2014

Ten Tips for Implementing SSL VPN Securely


VPN Installation Errors and Resolutions

The following error messages are sometimes encountered when people use the University's VPN configuration tool.
Error: WIL Extender Error 619/Service has not been started
Resolution: Start the service by opening the Services Control Panel using the steps below
1. Open the Control Panel
2. Click on Administrative Tools
3. Click on Services
4. Locate IPSec Services
5. Right click
6. Select Start
If the service starts, and continues to run, re-run the VPN configuration tool. If the service does not start follow the steps below.

How to Stay Secure With VPN

In last week’s episode, The Dangers of Unsecured WiFi Hotspots, we talked about how to keep your computer and your personal information safe when surfing wirelessly. In that episode, I promised to follow up with how to use a VPN for ultimate security while on the go. I’ll make good on my promise today.
Before I go on, I want to throw this disclaimer out there: This is a pretty advanced topic for your average computer user. But hackers get better and better at stealing your information on the web, so hold on to this information for your reference, should you decide to create a VPN in the future.

How to Make Your VPN Even More Secure

How to Make Your VPN Even More Secure
In the past few years, VPN services have hit the big time—especially among BitTorrent users. These days more and more internet users see running a privacy enhancing service as a requirement rather than just a luxury. They're not always perfect, though. Here are a few tips and tricks that can enhance the security of any VPN. 
While simple to set up and use out of the box, it may come as a surprise that the security ofVPN anonymity services can be improved. Of course, when things run absolutely to plan there's little to worry about, but there are occasions where there may be a hiccup or where an extra level of security is needed.

An Internet of Things prediction for 2025 -- with caveats

Computerworld - A massive survey by the Pew Research Center about the Internet of Things in 2025 is very optimistic about the future of the technology. But even though the report seemingly tramples on IoT skeptics, its responses are filled with questions, doubts and caveats.
Some 1,600 people in the technology industry, academia, consulting, law and others with expertise on this issue were surveyed, and 83% agreed that the Internet of Things, embedded and wearable computing, will "have widespread and beneficial effects" by 2025. (Report PDF)
The report included a written response from Karl Fogel, a partner at Open Tech Strategies, which helps organizations run and launch open source projects. Fogel's note focused on wearables -- and was scalding: "No, yuck, we don't need this, and most people aren't asking for it."

10 tips to secure client VPNs

Computerworld - If you have given your trusted employees and key contractors remote access to your network via a client virtual private network (VPN), congratulations! By now, you have seen the productivity and cost benefits from allowing collaboration that surmounts geographical separation.
You may also have discovered that keeping your network secure is now even trickier than it was, because each uncontrolled remote computer potentially creates another avenue of access to the network for attackers. Here are 10 tips to help secure your network while ensuring the benefits of your VPN.

How to Block Your IP Address

If you'd rather not be potentially tracked while browsing the internet, you'll want to hide IP address. There are several ways to do this, with varying levels of ease and reliability. Follow this guide to keep your online identity hidden.

How to Completely Anonymize Your BitTorrent Traffic with a Proxy

How to Completely Anonymize Your BitTorrent Traffic with a Proxy
BitTorrent isn't the quiet haven it once was. These days, everyone's looking to throttle your connection, spy on what you're downloading, or even send you an ominous letter. If you use BitTorrent, you absolutely need to take precautions to hide your identity. Here's how to do that with a simple proxy.
This post originally detailed the setup of a proxy called BTGuard. Since its original publication in 2011, we've changed our recommendation to Private Internet Access due to BTGuard's slow speeds, bad customer service, and other difficulties. If you're still interested in using BTGuard, you can find instructions on their web site.

How (and why) to surf the web in secret

They say no one can hear you scream in space, but if you so much as whisper on the Web, you can be tracked by a dozen different organizations and recorded for posterity. Simply visiting a website can allow its operators to figure out your general physical location, identify details about your device information, and install advertising cookies that can track your movements around the Web. (Don't believe me? )
Not everyone likes the idea of having his or her entire digital lives scraped, analyzed and (in countries with restrictive regimes) controlled outright by third parties. So please consider the following tools and tips, which will hide your IP address and have you surfing the Web in blissful anonymity in no time.

Tips to Avoid IP-Address Tracking

The state-of-the-art way of avoiding IP tracking is to use a Virtual Private Network (VPN) like IP Vanish. The way it works is that you log into the VPN just like you would log into your ISP. After that point, all of your traffic goes to the VPN company which then sends it out to the internet. If somebody sniffs your packets, they will just see one encrypted stream going to-and-from the VPN company.

For example, if you were logged into a VPN right now, we would have no idea who you were. Our server logs would show an IP address that belongs to your VPN company, and that would be all we would know. We could identify the VPN company, and guess at what country you are in based on their home address, but that’s about it. And even that doesn’t always work because with a VPN like IP Vanish you can select which server to log into, and they have servers all over the world! You could live in Iceland, log into their Panama server, and the internet would have no clue as to your location.
Of course, nothing is perfect. The VPN company knows who you are, and if they get a subpena, they might have to hand over your name. However, VPNs work well enough and have grown in popularity in response to the “Six Strikes” campaign by U.S. ISPs.

24 networking tips that actually work

The idea of networking makes many people uncomfortable … or confused.
It’s easy to see why.
When most people think about networking it seems insincere at best — and selfish at worst. This, of course, is the complete opposite of what networking is supposed to be — friendly, useful, and genuine.
It’s easy for most of us to be friendly and useful with people we know. However, because networking is a “business activity” it’s easy to think that we need to act in a different way.
Unfortunately, most networking strategies come across as pushy, needy, or self-serving — even though the people using them rarely act that way in day-to-day life.

How to setup OpenVPN on Android with FeatVPN (no root required)

This guide will show you how to setup an OpenVPN connection on any android device using the application FeatVPN.  FeatVPN FREE version can be downloaded from google play and is limited to one hour VPN connection per day. The premium version for $4 has unlimited VPN access.
For android 4.0 users you can download the fully functional beta version of FeatVPN free from here:
STEP 1
On your computer, access your activation email with crt and .opvn files. These can also be downloaded from the "My Services" area under your VPN account. Organize each server .crt and .ovpn file into it's own zip file and copy to your android device via USB or memory card.
Here are six example server configs that can be downloaded directly to your android device for quick setup:
Members have access to 20+ servers - you can create the remaining servers by adding each to an individual zip file as seen in the links above.

How to setup Torrent Proxy with uTorrent/Bittorrent

1. Start the uTorrent or Bittorrent application. Click the “Options” tab. Select “Preferences” and then the “Connection” tab on the left.
2. Choose the type of proxy as TorGuard default “SOCKS5.”
For proxy IP use: proxy.torguard.tg (you can also use a specific proxy IP of choice from the torguard.net members area under My Servers)
Change the “Port” option to 1080For username and password, be sure to enter your proxy username and password you choosen at signup.
Click “Authentication” checkbox.
Select the “Resolve Hostnames” and “Use Proxy for Connections” boxes.  All information required will display with the proxy address.


3. Click "Apply". Close your torrent client, restart it then your done!