Internet Safety

How to Create an SSH Tunnel With Putty

How to Create an SSH Tunnel With Putty
SSH tunnels are encrypted pathways that allow users to bypass firewalls that prohibit certain Internet traffic. This guide will help you create an SSH tunnel with Putty, a free software client. In this example we will be connecting to the computer at

How to Block Bad Websites

How to Block Bad Websites
The Internet hosts an abundance of malicious websites that attempt to infect the computers of unwary visitors. Even experienced users know that it is almost impossible to avoid virus attacks manually. You need to have an active, reliable Internet sec

How to Disable Webroot Firewall

How to Disable Webroot Firewall
Webroot is an Internet security company based out of Colorado. The company, founded in 1997, offers Internet security programs for businesses and home users. The Webroot Internet Security Essentials and Webroot Internet Security Complete programs inc

How to Unblock a Port

How to Unblock a Port
A port enables your operating system to establish a connection with other servers. For instance, AIM chat uses port 4443, games such as "World of Warcraft" use port 3724 and port 25 is the default port to send and receive emails. There are two t

How to Block Public Information

How to Block Public Information
If you have ever searched your name on the Internet, you might be surprised to see how much of your personal information is online. Many sites offer your personal information to anyone for a small fee, claiming it is public information and can be fou

How to Change a Private IP to a Public IP

How to Change a Private IP to a Public IP
A private IP address hides you behind your ISP's server providing an extra layer of security; however, private IP addresses keep you from using Web services that require an IP address to communicate with you. For instance, if you want to host your ow

How to Turn Off the Netgear Firewall

How to Turn Off the Netgear Firewall
A firewall monitors network traffic and will allow certain traffic through and keep others out. Your Netgear router is capable of editing your firewall, and you can allow all inbound and outbound traffic by configuring the router. If you have concern

How to Secure an SMC Router

How to Secure an SMC Router
If the security on your SMC router is compromised, users may have be able to monitor the content you are accessing and be able to use your network to access the Internet. Securing your router allows you to create an encrypted password that will ensur

How to Access SonicWall

How to Access SonicWall
To configure your SonicWall firewall, you must first access it through the SonicWall configuration website. The Sonicwall website does not appear to be a normal website since it is only made up of numbers. Once on the site, you have options to change

How to Find Reputable Websites

How to Find Reputable Websites
Some websites almost seem to scream insincerity, loaded with flashing graphics, garish colors, hyperbolic text and unsavory content. Others have a look and feel designed to communicate respectability. It doesn't take much time on the Internet, howeve

How to Reach Hackers When They Are Hacking Your Computer

How to Reach Hackers When They Are Hacking Your Computer
Catching a hacker in the act is tricky business. In the movies, a hacking attempt is usually accompanied by flashy pop-up windows or signs of programs being remotely installed. The reality is that most hacking attempts are much more subtle, and can o

How to Check for Adware

How to Check for Adware
Adware is a common and almost inescapable part of using the Internet. Many useful browser add-ons have built-in adware, but many times malicious adware will worm its way into your computer without being detected. Anti-virus software is your computer'

How to Block Email Using Web Mail

How to Block Email Using Web Mail
Any email user will occasionally have a problem with receiving unwanted messages. This is true for users of web-based email, as well as for users of installed email programs, such as Outlook. Although there is no way to completely eliminate all unwan

How to Remove Antimalware Doctor Virus

How to Remove Antimalware Doctor Virus
Antimalware Doctor is one of many viruses that disguise themselves as legitimate antivirus programs. Antimalware Doctor performs a fake and unsolicited scan of your computer and notifies you that your computer is infected. Antimalware Doctor then att

How to Bypass a Netgear Firewall

How to Bypass a Netgear Firewall
Netgear delivers a prolific security networking solution with a technologically advanced Web blocking firewall that works for both home and business networks. However, the Netgear firewall can also block websites that pose no threat to the network or

How to Remotely Install eBlaster

How to Remotely Install eBlaster
EBlaster, a SpectorSoft product, records all activity on a computer on which it has been installed. It then sends these records via email to an address that is specified at installation. It is used by parents and employers to monitor computer activit

How to Change My AT&T Password

How to Change My AT&T Password
You can access all of your AT&T account information online at att.com. You also can log in to the site to view potential upgrades, add features and pay your bill. You must have a user name to be able to log in to your account. You also need a passwor

How to Report Email Fraud to Bank of America

How to Report Email Fraud to Bank of America
Many Internet users shop and pay bills online, using credit cards and banking services to complete their transactions. While these transactions are reasonably secure, criminals are constantly trying to evade or override the security precautions banks
What Others Are Reading