<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>PCMech &#187; Rahul Pitre</title>
	<atom:link href="http://www.pcmech.com/article/author/rpitre/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.pcmech.com</link>
	<description>Tech Powered Life... Simplified</description>
	<lastBuildDate>Wed, 15 May 2013 16:29:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Networking More Than Just Computers: Part 2</title>
		<link>http://www.pcmech.com/article/networking-more-than-just-computers-part-2/</link>
		<comments>http://www.pcmech.com/article/networking-more-than-just-computers-part-2/#comments</comments>
		<pubDate>Thu, 05 Jul 2007 12:00:00 +0000</pubDate>
		<dc:creator>Rahul Pitre</dc:creator>
				<category><![CDATA[Business Center]]></category>

		<guid isPermaLink="false">http://1262438561</guid>
		<description><![CDATA[You can not only attach printers to a network, but hard drive storage devices as well!]]></description>
				<content:encoded><![CDATA[<p><a href="/article/networking-more-than-just-computers-part-1/">Last week I discussed the basic steps</a> in extending your network beyond just computers. We started out with adding printers to a network. This week I&#8217;ll discuss adding Network Attached Storage (NAS) device to your network.</p>
<p>A NAS device, in simple English, is a disk drive that is attached to your network instead of to a specific computer. Because it is attached to the network, you can access the data on it from any computer on the network.</p>
<p>You can get two kinds of NAS gadgets: </p>
<ol>
<li>A controller with one or more empty drive bays to which you can attached any internal IDE disk drive</li>
<li>An all encompassing device with one or more disk drives built-in.</li>
</ol>
<p>The two are not much different. In the fist instance, you have to do the work of attaching a drive to the controller yourself while in the second instance the manufacturer does the work for you. Buy one which you are comfortable with.</p>
<p>NAS devices usually come with their own operating system, mostly some flavor of Linux. Therefore, they can work with PCs, Macs, and even Linux computers. Installing them is quite simple. You take them out of the box and attach drives, if necessary. Then you connect them to a hub, switch, or router on your network by means of an Ethernet cable. That&#8217;s it. The device appears under your network in My Network Places.</p>
<p>But you might not be able use it as yet. Some devices are preconfigured for use with Windows computers and their drives are formatted in FAT or FAT32 format. They even have a default share. If you purchase such a device, you are in business right away. You must configure others before you can use them.</p>
<p>Configuring these devices is quite easy. They have a browser-based management interface very similar to that of a router. You type the URL provided in the device&#8217;s manual in your browser&#8217;s address to bring up the management interface just as you do with a router. You can do the following in the management interface:</p>
<ol>
<li>Format the drive</li>
<li>Create folders and share them</li>
<li>Create user accounts</li>
<li>Grant users access to the shared folders</li>
</ol>
<p>The process of formatting the drive and creating folders is basically the same as it is on your computer. But you must check the device&#8217;s manual before doing so. With some NAS devices, you can&#8217;t format the drive in NTFS format if you want to write to it; you must use the FAT or FAT 32 formats. And some devices don&#8217;t support long folder names &#8212; you must restrict folder names to the 8.3 format (8 character filenames). Read the manual and format the drive accordingly. Then create folders on it depending on the supported naming convention and enable sharing on them. If you want the data on the network to be accessible to everyone on the network, you don&#8217;t need to do much else, but if you want to restrict the access to only certain users, you must configure folder access rules.</p>
<p>The first step is to create user IDs from the device&#8217;s management interface. The trick is to create the same user ID and password for a use as the one he has on his computer. Windows has a built-in feature called pass-through authentication which automatically manages the access. It passes the user ID and password to the device, which uses it to authenticate the user. But be careful. Some devices only support eight character passwords. If yours is one of them, and your users have longer passwords, you will have to reduce the length of the user&#8217;s passwords on their computers to eight characters or less for pass-through authentication to work.</p>
<p>The next step is to grant access to the shared folders to the user accounts you just created. This process is exactly the same as sharing a folder on your computer with another user. So you won&#8217;t have much trouble with it.</p>
<p>Finally you map the shared folders as drives on the user&#8217;s computers. Everyone can now use these shared folders as if they were on their own computers.</p>
<p>&quot;Why go through all this trouble&quot;, you ask? First, you don&#8217;t have to leave all your computers on simply for other people to access shared folders on them. But the biggest reason is that you can streamline your backup process. If you leave your applications on your computers but move the data to the NAS device, you only have to back up a few folders in a single location instead of backing up several folders on several computers. </p>
<p>In fact, most of these devices come with a USB port at the back, to which you can attach a regular external hard drive. (Make sure the capacity of the external drive is equal to or greater than the NAS drive.) The devices also come with automatic backup software. All you have to do to schedule automatic backups is select the folders to back up and set a time to start the back up. Both the settings can be set from the device&#8217;s management interface.</p>
<p>As a bonus, most NAS devices come with a built-in print server. Recall from the first part of this article that you can connect desktop printers to a network with the help of a print server. If you buy a NAS device, you don&#8217;t have to buy a separate print server; you can simply use the built-in one. But keep in mind that some features of AIOs won&#8217;t work with print servers.</p>
<p>Believe it or not, this is an incredibly simple and elegant storage, backup, and printer sharing solution for workgroups&#8211; you don&#8217;t have to mess with tapes and writable CDs or DVDs. And it is an inexpensive one too. NAS devices are not expensive. I recently bought 500GB device at Buy.com for under $150. For under $250, including the cost of an external USB drive, you can share all your data, back it up automatically, and even share your old desktop printer. Now that&#8217;s what I call an irresistible deal!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/networking-more-than-just-computers-part-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Networking More Than Just Computers: Part 1</title>
		<link>http://www.pcmech.com/article/networking-more-than-just-computers-part-1/</link>
		<comments>http://www.pcmech.com/article/networking-more-than-just-computers-part-1/#comments</comments>
		<pubDate>Thu, 28 Jun 2007 12:00:00 +0000</pubDate>
		<dc:creator>Rahul Pitre</dc:creator>
				<category><![CDATA[Business Center]]></category>

		<guid isPermaLink="false">http://1343630128</guid>
		<description><![CDATA[You can not only put computers on a network, but printers and storage devices as well.]]></description>
				<content:encoded><![CDATA[<p>A home or a <a href="http://en.wikipedia.org/wiki/SOHO_network">SOHO network</a> was unheard of just a few years ago. Only big companies had them. The few people who owned more than one computer at home used floppy disks to transfer data between them and an advanced (in those days) feature of Windows called Internet Connection Sharing (ICS) to share a modem in order to connect to the Internet. </p>
<p>Then came the broadband revolution. All of a sudden broadband service providers started throwing in a little box called a router with their package. These routers usually had four Ethernet ports on the back. You didn&#8217;t have to worry about setting up ICS any more. You simply had to put a network card in each of your computers and connect them to the router using a cable with a phone-jack-on-steroids at each end. That&#8217;s it. The router took care of everything.</p>
<p>Most people associate a router with a shared Internet connection. But what many fail to realize is that a router can do much more than simply connecting them to the Internet. It can act as the cornerstone of a network that has not only computers attached to it but other devices as well. In fact, you can now get all sorts of gadgets that allow you to use your network to its full potential.</p>
<p>The first thing you must know about an Ethernet network is that each device connected to it needs something called an IP address. Think of an IP address as a unique number that identifies that device on the network. In the good old days, you had to assign IP addresses to devices manually. But modern routers have a software program called a DHCP server built into them. The DHCP server automatically assigns an IP address to anything that is connected to the network it is on. That&#8217;s why you can simply plug in a cable into the router&#8217;s port and everything works just fine.</p>
<p>But a router usually has only four ports. What if you want to connect five computers or devices to it? No problem. That can easily be done. You just have to run to the local CompUSA and get another little box called a hub. A hub looks suspiciously like a router. But it&#8217;s not a router. It usually has five or nine (and sometimes more) Ethernet ports on the back. One of those ports is called an uplink port. Some smart hubs don&#8217;t have a designated uplink port &#8211; you can use any port as an uplink port. You connect the uplink port of a hub to a port on the router by means of an Ethernet cable. Then you can use the remaining ports on the hub as if they were on a router. In effect, a hub adds ports to your network which you can use to add more computers or devices. You can add a hub anywhere on your network. You can even chain hubs to create more ports. Hubs, in effect, allow you to expand your network.</p>
<p>One problem with hubs is that they are slow. That&#8217;s so because data flows through them only in one direction at a time. They are like roads under construction where a guy, wearing an orange vest and a Stop/Go sign in his hand, allows traffic in either direction to pass alternately. Better substitutes for hubs are devices called switches. Switches are just like hubs, but they allow data to flow in both directions simultaneously. Naturally they are a little more expensive than hubs.</p>
<p>Okay, now you know how to expand your network. But what will you do with all those ports? As it happens, you can connect all sorts of gadgets to them. </p>
<p>To begin with, you can share printers. &quot;Big deal!&quot; you might say, &quot;I already share my printer from Windows.&quot; The problem with that scheme, however, is that the computer to which the printer is attached must be powered on for the Windows share to work. A network attached printer doesn&#8217;t have that restriction. As long as the printer itself is powered on, you can print to it from any computer on the network.</p>
<p>So how do you connect a printer to the network? Just as you connect a computer to the network. With an Ethernet cable. But to do so, your printer must have an Ethernet port. Such printers are called network printers. They are not expensive. They cost roughly the same as regular printers. Recently I bought a Brother network printer on sale at Staples for $79. </p>
<p>Once a printer is on the network, you will be able to see it in the Add Printer dialog from all your computers. Just add it as you would a regular printer and you can print to it.</p>
<p>But what if you already have a desktop printer? Again, no problem. You must get another gadget called an Ethernet print server. These gadgets have an Ethernet port and one or more USB or parallel ports. You connect the print server to a router, a hub, or a switch with, you guessed it, an Ethernet cable. Then you connect your desktop printer to the USB port on the print server. As you can see, it&#8217;s pretty easy to transform your desktop printer into a network printer.</p>
<p>Once you attach all printers at home or in your home office to the network, printing becomes incredibly simple. No more frantic trips to Staples to get ink or copying files to the floppy to take them to another computer for printing.</p>
<p>Before you trot along to buy a print server, keep in mind that print servers may not work with really old printers. If you have a parallel printer, you are better of throwing it and buying a network printer. Print servers also don&#8217;t work with All-In-One (AIO) printers. Some AIOs can print if they are connected to print servers, but you won&#8217;t be able to fax or scan with them over the network.</p>
<p>However, you can buy network AIO printers that will allow you to use the fax and scan features from any computer on the network. Of course, you will need to install the software that came with your printer on every computer you want to scan and fax from. Check out Brother&#8217;s AIOs if you are interested in these features.</p>
<p>Like printers, you can share disk drives over the network as well. Again, these drives are not a computer&#8217;s internal disk drives external USB drives attached to it. They are free-standing disk drives attached to the network with an Ethernet cable which are accessible to all computers on the network.</p>
<p>I&#8217;ll go over network-attached drives and a few more gadgets in next week&#8217;s column (<a href="/article/networking-more-than-just-computers-part-2/">Part 2</a>).&nbsp; Until then, happy printing!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/networking-more-than-just-computers-part-1/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How To Secure Wireless Networks</title>
		<link>http://www.pcmech.com/article/how-to-secure-wireless-networks/</link>
		<comments>http://www.pcmech.com/article/how-to-secure-wireless-networks/#comments</comments>
		<pubDate>Thu, 21 Jun 2007 12:00:00 +0000</pubDate>
		<dc:creator>Rahul Pitre</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://1986159848</guid>
		<description><![CDATA[Keep people from accessing your home network and Internet connection]]></description>
				<content:encoded><![CDATA[<p>When I turn on my laptop at home and look for available wireless connections, I see a dozen of them. That&#8217;s not surprising given the number of broadband connections in my neighborhood, each of which comes with a free wireless router. What&#8217;s surprising is the fact that all of them, except a couple, are unsecured. Some of them still have the manufacturer&#8217;s default password. They all violate the first rule of wireless computing: <strong>ALL WIRELESS NETWORKS MUST BE SECURED</strong>.</p>
<p>Here are a few things you can do secure your wireless router and network:</p>
<h3>1. Change your router&#8217;s default password</h3>
<p>This should be the first step you take after you power up your router for the first time. Straight out of the box, most routers have a lame password such as &quot;password&quot; or no password at all. Not changing it is like leaving the front door of your house wide open before going on vacation. It&#8217;s an invitation to bad guys. Change it.</p>
<p>And write it down somewhere. If you forget it, (and you probably will because you don&#8217;t need it all that often) you will have to push is a little button at the back to reset it. Remember that resetting clears all settings. You will have to set all the configuration options again.</p>
<h3>2. Disable your router&#8217;s remote administration option</h3>
<p>The next step is to disable remote administration for your router. If remote administration is enabled, anyone can access your router across the Internet. This option is only suitable for people who don&#8217;t administer their own routers and commission some one else to do so for them over the Internet. Most people can do without it.</p>
<h3>3. Disable wireless option if you don&#8217;t use it</h3>
<p>If all your computers, printers, and pieces of other equipment are connected to the router by means of a cable, turn off the wireless connection, or &quot;radio&quot; as the documentation of some router calls it, on your router. If you can&#8217;t find the option in your router&#8217;s administration interface, your router is too old; you may want to get a new one.</p>
<h3>4. Change your network&#8217;s name</h3>
<p>Routers come with default names, of SSIDs as their names are called. Few people change them. That&#8217;s why you see so many networks named WLAN or Netgear. Change the name. But don&#8217;t change it to something like Joe&#8217;s Network. That&#8217;s a dead giveaway that it&#8217;s your network. Choose a name that you will recognize but others won&#8217;t.</p>
<h3>5. Stop broadcasting the SSID</h3>
<p>Out of the box, broadcasting of SSIDs is enabled on most routers because other computer equipment can &quot;see&quot; the router and connect to it. But if you can see the network, so can everyone else within the router&#8217;s wireless range. Stop broadcasting it. </p>
<p>If you do, you will have to memorize the SSID and enter it every time you want to set up a new wireless connection on a computer. This certainly is an inconvenience but it&#8217;s a small price to pay for maintaining a secure environment.&nbsp; Keep in mind that this simple maneuver will not stop determined hackers.</p>
<h3>6. Enable encryption on your router</h3>
<p>Wireless routers employ three kinds of encryption schemes &#8212; WPA2 (Wi-Fi Protected Access 2), WPA (Wi-Fi Protected Access), and WEP (Wired Equivalent Privacy). WPA2 is the most secure scheme and WEP is the least secure one. WPA2 is available only on the latest routers. Use it if it is available on yours. If it isn&#8217;t, see if WPA is. It is preferable to WEP which is relatively easy to crack and therefore the least desirable. But if WEP is all your router supports, use it anyway. It is still better than no encryption scheme.</p>
<p>Remember that all your wireless equipment must support the encryption scheme you choose. If you select WPA for your router, but your wireless network card only works with WEP, you won&#8217;t be able to connect to your router. The solution, then, is to either use the scheme which is the least common denominator on all your equipment or upgrade the older equipment which doesn&#8217;t support the encryption scheme of your choice to newer models which do.</p>
<h3>7. Limit the number of IP addresses </h3>
<p>Most routers have built-in DHCP servers. The DHCP server assigns IP addresses to computers and pieces of other equipment when they connect to the router. A typical home router can support a couple of hundred pieces of equipment. But you can limit the number of IP addresses that the DHCP server will dole out. If you have two computers and a network printer, you can limit the number of IP addresses your DHCP server issues to three.</p>
<p>Mind you, this is not a fool-proof scheme. If one of your computers is off, one IP address is still up for grabs if a hacker can grab it. </p>
<h3>8. Enable MAC address filtering</h3>
<p>Each network card or interface has a globally unique address called a MAC address. You can configure your router to allow connections which originate from the MAC addresses of your computer equipment.</p>
<p>It&#8217;s not easy to find MAC addresses of all your equipment. The best way to get them is to connect all your equipment to the router while MAC address filtering is disabled. When you do so, you will see all your equipment listed in your router&#8217;s administration interface along with their MAC addresses. Print the page for your reference. Then enable MAC address filtering and enter the MAC addresses from the printed page.</p>
<p>All these settings are accessible from your router&#8217;s administration interface which you can go to by typing your router&#8217;s IP address in your browser. Check your router&#8217;s manual for its IP address.</p>
<h3>Conclusion</h3>
<p>As you can see, securing a wireless network is not very difficult. Yet, most people don&#8217;t bother with it and end up exposing their networks to online threats. Don&#8217;t let it happen to your network. </p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/how-to-secure-wireless-networks/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Do You Need a Server?</title>
		<link>http://www.pcmech.com/article/do-you-need-a-server/</link>
		<comments>http://www.pcmech.com/article/do-you-need-a-server/#comments</comments>
		<pubDate>Fri, 01 Jun 2007 12:00:00 +0000</pubDate>
		<dc:creator>Rahul Pitre</dc:creator>
				<category><![CDATA[Business Center]]></category>

		<guid isPermaLink="false">http://254058576</guid>
		<description><![CDATA[When is it time to install a server on your network?  Is maintaining a server-less network becoming a hassle?]]></description>
				<content:encoded><![CDATA[<p>If you own more than one computer, chances are you already have a network. </p>
<p>These days, most broadband service providers throw in a router with a new connection. Typically it has four slots on the back, which means that you can connect up to four computers to the Internet simultaneously without adding any other hardware. Once you connect a second computer to the router, you have a little network of your own. The next logical step for most people is to plug in a network-enabled printer into the router so that they can print to it from any of the computers on the network.</p>
<p>This kind of network is called a peer-to-peer network because all computers on it are peers &#8212; none of them is more important than the others. Unfortunately, that&#8217;s where many small networks stop growing in functionality. Few progress beyond sharing an Internet connection and a printer. But there is a lot more that you can do with a network.</p>
<p>It is possible to access data on a computer on a peer-to-peer network from any other computer on the network. This opens up many possibilities. You can back up important data on to the hard disk of another computer, for example, to protect it from disk crashes.</p>
<p>To share data between computers, you must take two steps:</p>
<ol>
<li>Make a folder sharable</li>
<li>Grant access to the shared folder to others</li>
</ol>
<p>The first step is easy enough. Bring up the properties of the folder of the drive in Windows Explorer, Click on the <strong>Sharing</strong> tab, and choose <strong>Share this folder</strong> option.</p>
<p>Granting access to others is a bit tricky. If you want Joe to share a folder on your computer, Joe must have an account on your computer as well. Once you create one for him, he can see the shared folder in <strong>My Network Places</strong> on his computer. When he clicks on it, your computer will ask him for a password, because it doesn&#8217;t know that Joe is the same Joe who has an account on your computer. Joe can then enter his user ID and password to authenticate himself with your computer. After he is authenticated, he can use the folder on your computer as if it were on his own computer.</p>
<p>The authentication can be seamless if you use a feature of Windows called pass-through authentication. The trick is to have an account for Joe on your computer as well as on his own computer with identical user ID/password combination. If this condition is met, Windows on his computer passes on his authentication information to Windows on your computer when Joe clicks on the shared folder. Your computer verifies it and allows Joe to access the folder without popping up an authentication dialog.</p>
<p>Sharing data this way is better than not being able to share it at all but this scheme of things has a couple of problems:</p>
<ol>
<li>Your computer must be powered on when Joe wants to access the shared folder</li>
<li>Every time Joe changes his password on his computer, he must remember to change it on yours as well.</li>
</ol>
<p>&quot;Big deal&quot; you might say, &quot;We can easily manage that.&quot; And you would be right. But only as long as you and Joe are the only people sharing data on your network and you share a single folder. If you have ten people, ten computers, and forty shared folders, you will rack up dollars on your electricity bill and Joe will have to spend all his day changing passwords.</p>
<p>Wouldn&#8217;t it be great if all the authentication information could be stored in a single place away from all your computers so that Joe can do some useful work instead of changing his password three hundred times? And why not have the shared folders in the same location as the authentication information so that you won&#8217;t have to leave all your computers running all the time?</p>
<p>Such a solution does exist. It&#8217;s called a server. A server is a special computer which fulfils requests from other computers. Once you add a server to your network and entrust the responsibility of authentication to it, your network is transformed from a peer-to-peer network in to a client/server network.</p>
<p>A server merely provides a service when asked. Severs can provide different kinds of services. Large networks typically have many servers. Each server is usually dedicated to providing a single service. Those that provide file-sharing facilities are called file servers. Those that server Web pages are called Web servers, and those that provide authentication services are called Domain Controllers. There are many more. In smaller networks, typically found in home or small-business environments, a single physical server performs several of these duties. </p>
<p>Servers need special operating systems which are optimized for providing services as opposed to serving a single user interactively. They are much more difficult to install and configure than installing Windows on a desktop.</p>
<p>If you are technically challenged, you will probably need professional services for installing a server and setting up a network around it. If, on the other hand, you consider yourself a power user, you may be able to install a server yourself using an easy-to-install server operating system such as Windows Small Business Server 2003.</p>
<p>Windows Small Business Server 2003 performs several duties, which includes:</p>
<ul>
<li>Authentication</li>
<li>Internet security</li>
<li>Serving database queries</li>
<li>Hosting of a Web server</li>
<li>Hosting of an e-mail server</li>
<li>File sharing services </li>
</ul>
<p>Not every small business needs a server, but if you find that you and your co-workers are spending a good bit of time locating and exchanging documents, a server may just be what the doctor ordered.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/do-you-need-a-server/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>How to Fix Wireless Networking Problems</title>
		<link>http://www.pcmech.com/article/how-to-fix-wireless-networking-problems/</link>
		<comments>http://www.pcmech.com/article/how-to-fix-wireless-networking-problems/#comments</comments>
		<pubDate>Thu, 24 May 2007 12:00:00 +0000</pubDate>
		<dc:creator>Rahul Pitre</dc:creator>
				<category><![CDATA[Business Center]]></category>

		<guid isPermaLink="false">http://1557593273</guid>
		<description><![CDATA[Learn about simple solutions to the complicated problem of bad wireless connections]]></description>
				<content:encoded><![CDATA[<p>It is quite easy to build a wireless network these days. Most broadband service providers throw in a free wireless router with installation. All you need is a wireless network adapter in your computer. If you have a late-model computer, especially a laptop, it probably has wireless networking already built in. If not, just stick in a USB wireless network adapter and you are on your way.</p>
<p>While they are easy to install, wireless networks often have performance problems:</p>
<ul>
<li>&nbsp;Your computer may show a very weak signal strength </li>
<li>Telephones, microwaves, or other appliances may interfere with the wireless signal</li>
<li>The signal quality may fluctuate, or even disappear altogether, in different parts of your office or home</li>
<li>The connection may be very slow </li>
</ul>
<p>Here is how you can improve the performance of you underperforming wireless network:</p>
<h3>1.&nbsp; Move wireless router to a better location</h3>
<p>The biggest culprit for weak signals is the location of routers. Many routers are installed at less than ideal locations &#8211; under tables, in closets, in corners on the floor, and basements to name just a few. Many are installed near the outer wall of a building. This results in weak signals on the other end of the building.</p>
<p>It is often difficult to move a router too far away once it is installed. But it may be possible to move it by a couple of feet. Try moving it off the floor and away from the walls. If it is inside a closet, you may be able to get it out simply by drilling a hole in the wall for the cable.</p>
<h3>2. Move wireless router away from other wireless equipment</h3>
<p>Most wireless networks operate at 2.4MHz, the same frequency as older cordless telephones and other wireless gadgets. Signals from these gadgets may interfere with your router&#8217;s signals. You can try moving you router away from such equipment (or the equipment away from the router if you can&#8217;t move the router).</p>
<p>Another possible solution may be to upgrade your phones to newer ones which operate at 5.8MHz.</p>
<h3>3. Get a high-gain antenna for your wireless router</h3>
<p>If you can&#8217;t more the router, you can try replacing your router&#8217;s antenna with a high-gain antenna. You can&#8217;t replace antennas on all routers, but you can do so on many newer models.</p>
<p>Antennas on most routers have 360 degree coverage. If your router is located in one cornet of the building, a good part of its coverage area will lie outside the building. In such cases, you can get unidirectional high-gain antennas which transmit signals in 180 or even 90 degrees. Again, you must have router which allows you to replace its antennas.</p>
<h3>4. Install a repeater</h3>
<p>A repeater is a device for boosting wireless signals across greater distances. If your router&#8217;s signal is weak in a certain location in the building, you can place a repeater half way between the router and the location to boost the signal strength.</p>
<h3>5. Upgrade your router&#8217;s firmware</h3>
<p>Log in to your router&#8217;s administration interface. You will usually find an option to upgrade its firmware. Most people install routers and forget about them. You may be surprised to find that your router has several firmware upgrades that you haven&#8217;t applied.</p>
<h3>6. Try changing your router&#8217;s broadcast channel</h3>
<p>Most cordless telephones have a little button on the handsets which you can press to change the channel if there is noise on the line. Like cordless telephones, routers broadcast on many channels too. You may be experiencing weak or noisy signals simply because your router broadcasts on a channel that doesn&#8217;t work well at your location. Try changing the channel. You will find an option to change the channel in your router&#8217;s administration interface.</p>
<p>If fixes at the router end of your network don&#8217;t work very well, you can try fixes at the other end &#8212; your computer.</p>
<h3>7. Update the network adapter on your computer</h3>
<p>If you have a desktop computer with an internal network card, try using a USB network adapter instead. These adapters usually have an antenna of their own to better capture signals. Laptops with on-board network adapters are usually fine; you don&#8217;t need to replace them. But if you use a card adapter with your laptop, try getting one with an external antenna.</p>
<h3>8. Update your computer&#8217;s network adapter drivers</h3>
<p>Just as a router has firmware upgrades, the network adapter in your computer have driver updates. You can find driver updates at the adapter manufacturer&#8217;s website or at Windows Update web site.</p>
<p>If the signal strength doesn&#8217;t improve, you could try replacing your wireless router and network cards. You may have an old router which is based on the older 802.11b networking standard. 802.11g is the newer standard. 802.11g devices are several times faster that 802.11b devices. (802.11b devices operate an 11Mbps while 802.11g devices operate at 54 Mbps.)</p>
<p>802.11g devices are also backward compatible with 802.11b devices. In other words, if you buy a new 802.11g router, it will still work with the 802.11b network adapters in your computers. Still, if you upgrade your router to 802.11g, for best results you should consider upgrading network adapters in your computer to 802.11g as well.</p>
<p>If you decide to do so, consider buying extended-performance 802.11g devices which operate at twice the speed&#8211;108Mbps. But keep in mind that if you buy extended performance devices, you must buy all of them from a single manufacturer. Most manufacturers such as Netgear, Linksys, and D-Link make extended-performance 802.11g devices but they are not necessarily interoperable with devices from other manufacturers.</p>
<p>And if none of these solutions work, forget about wireless and go back to good old wired networking!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/how-to-fix-wireless-networking-problems/feed/</wfw:commentRss>
		<slash:comments>26</slash:comments>
		</item>
		<item>
		<title>How to Buy a Business PC</title>
		<link>http://www.pcmech.com/article/how-to-buy-a-business-pc/</link>
		<comments>http://www.pcmech.com/article/how-to-buy-a-business-pc/#comments</comments>
		<pubDate>Thu, 17 May 2007 12:00:00 +0000</pubDate>
		<dc:creator>Rahul Pitre</dc:creator>
				<category><![CDATA[Business Center]]></category>

		<guid isPermaLink="false">http://595970489</guid>
		<description><![CDATA[Rahul offers suggestions on building or buying PCs for your business]]></description>
				<content:encoded><![CDATA[<p>Every time I buy a PC I suffer from buyer&#8217;s remorse. Not because I buy the wrong thing, but because a new smaller, faster, meaner, cooler, and cheaper model hits the shelves a week after I make the purchase.</p>
<p>Now I am a techie and I know what I am buying. But if you are not a techie, deciding which PC to buy for your business and when to buy it can be an excruciatingly difficult process. So I&#8217;ll give you a few pointers on what to look for in a new business desktop.</p>
<h3>CPU</h3>
<p>The CPU is also called the microprocessor or processor. Two companies, Intel and AMD, make microprocessors. Intel&#8217;s microprocessors are generally comparatively more expensive than AMD&#8217;s. So, naturally, computers with Intel processors tend to be more expensive than those with AMD processors. Each company has its own cheerleaders, but for most people, either company&#8217;s microprocessor works equally well. Therefore computers with AMD processors often make more financial sense. Please don&#8217;t send me hate mail if you are in the Intel camp &#8212; I am not saying AMD&#8217;s processors are better; all I am saying is that they tend to be cheaper.</p>
<p>Both companies make premium processors and economy processors. Premium processors are usually the manufacturer&#8217;s flagship product. Economy processors are lower-end versions. Intel&#8217;s premium processor is the Core 2 Duo and its economy processor is the Pentium D. AMD&#8217;s premium processor is the Athlon 64 X2 and its economy processor is the Sempron.</p>
<p>Premium processors are faster and have more processing power. They are also more expensive. If you use your PC for high-end graphics or video editing work, or for computer-aided design (CAD) you will absolutely need the fastest, meanest processor you can find. If, on the other hand, you mainly use your PC for surfing the Web, Word processing, and other run-of-the-mill applications an economy processor may be just what the doctor prescribed. </p>
<p>If you have a small family, a small car may suffice for you. You can certainly buy a bus, but the excess capacity is wasted. The same is true of a processor&#8217;s processing power. If you can&#8217;t use it, there is little sense in paying for it.</p>
<p>The most prominently advertised feature of a processor is its speed. It is measured in GHz or Gigahertz and indicates how many basic instructions it can process in one second. A 3.0 GHz processor can perform 3 billion instructions per second. The latest processors are usually the fastest and usually carry a disproportionate premium. It often makes sense to buy processors a few rungs down the ladder. If the latest processor in the market is a 3.0 GHz processor, buying a 2.8 GHz or 2.4 GHz processor usually offers a better financial value without sacrificing too much on the performance front.</p>
<p>Finally there are 32-bit processors and 64-bit processors. 64-bit processors can process twice the amount of data in a given time as compared to 32-bit processors. But to take advantage of the extra capacity, you need software which is built for 64-bit processors. If you are buying the 64-bit version of Windows Vista, you will need 64-bit processors. But remember that there are very few 64-bit applications in the market, so functionality will be sacrificed under 64-bit.</p>
<h3>Memory</h3>
<p>Memory is often called RAM or Random Access Memory. Memory used to cost a fortune just a few years ago. Today memory is quire cheap. Assuming that you will run Windows Vista on your new computer (sooner or later), you will need at least 512 MB. But if you want to run other applications as well, 1 GB is highly desirable. If you run high-end applications to warrant a premium CPU, you may want to go as high as 4GB.</p>
<p>Memory is cheap at the moment and it is easy to install. So you don&#8217;t have to plan for your needs in the distant future. You can install additional memory later. But if you plan to do so, you need to consider the maximum amount of memory that the PC&#8217;s motherboard supports and the number of memory slots on it.</p>
<p>Let&#8217;s say you are looking at a PC with a maximum memory of 4 GB and 4 memory slots. If you want to install just 1 GB of memory, you are better off getting a single 1GB RAM chip rather than four 256 MB RAM chips. A 1 GB RAM chip will be slightly more expensive, but the expense is worth it because when you decide to upgrade, you can simply add additional 1 GB RAM chips. If, on the other hand, you buy four 256 MB RAM chips, you will have to throw them away when you decide to upgrade.</p>
<h3>Hard Drives</h3>
<p>Like memory, hard drives have become quite cheap in recent years. It is not uncommon to find 80GB or 120GB hard drives on even the cheapest PCs. But as with processors, bigger is not always better. If you store video or music on your PC, by all means buy as large a hard drive as you can. But if you use your PC strictly for business &#8212; estimates, proposals, invoices and other such mundane activities &#8212; an 80 GB drive may last you for ever.&nbsp; However, note that smaller drives do not always cost less.&nbsp; You can sometimes get a better deal going with a drive with a greater capacity.</p>
<p>Again like memory, it is easy to buy and install an additional hard drive later if you need it &#8212; an internal one if you can manage to install it, an external one otherwise.</p>
<h3>Video System</h3>
<p>A PC&#8217;s video system is responsible for sending video signals to the monitor. There are two common types of video systems &#8212; onboard video and video cards. The Video System needs memory. For most business applications 128 MB or 256 MB of memory is more than sufficient for the video system. For 2D multimedia applications (such as video editing), you may need more.</p>
<p>Onboard video is the cheaper option. It uses the PC&#8217;s RAM, but then leaves less RAM available for applications. You can compensate for it adding more RAM to your PC. For typical business applications, onboard video is good enough, and it saves you money.</p>
<p>But for graphics-intensive applications, a video card is the preferred option. Video cards have their own RAM chips. They don&#8217;t encroach on the PC&#8217;s RAM. Moreover, if your needs change, you can simply replace the video card with a more (or less) powerful one.</p>
<h3>DVD Drive</h3>
<p>CDs are on their way out. Look for DVD drives in a new computer. Preferably, they should be RW drives. That means they should be able to both read and write DVDs. DVD-RW drives are more expensive than CD-RW drives, but the additional expense is worth it, especially if you plan to own the computer for a few years.</p>
<p>The most important thing to keep in mind while buying a business PC is that business computing needs are often modest as compared to modern home-computing needs, which include resource-intensive applications for processing music and video. You don&#8217;t usually need the latest PC on the market business use. </p>
<p>For the last few years I have been buying new computers for my children and using their old computers for my business without any ill-effects. The biggest and the fastest is not necessarily the best fit for the job, after all.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/how-to-buy-a-business-pc/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>A Sound Privacy Policy</title>
		<link>http://www.pcmech.com/article/a-sound-privacy-policy/</link>
		<comments>http://www.pcmech.com/article/a-sound-privacy-policy/#comments</comments>
		<pubDate>Thu, 19 Apr 2007 12:00:00 +0000</pubDate>
		<dc:creator>Rahul Pitre</dc:creator>
				<category><![CDATA[Business Center]]></category>

		<guid isPermaLink="false">http://1141396474</guid>
		<description><![CDATA[Rahul details what to do on a privacy policy for your website and why you should have one.]]></description>
				<content:encoded><![CDATA[<p>With the number of identity thefts skyrocketing, most people are reluctant to part with their personal information online. The trouble is, almost anything you do online requires parting with some personal information, or at the very least, tolerating some invasion of privacy in the form of cookies and server logs. People who visit your web site face this dilemma too. You can allay their fears by posting a comprehensive privacy policy on your web site.</p>
<p><strong><br />The Need for Privacy Policy</strong><br />Inspiring confidence in customers is not the only reason to have a privacy policy. Sometimes you are legally required to post a privacy policy on your Web site depending on the nature of your web site, the location of your server, or the location of visitors to your web site. If you are in the financial services or healthcare industry, there are specific regulations as to what your privacy policy should contain. Some states like California have specific requirements too. So the first step in developing your privacy policy is to find out legal requirements, if any, which may be applicable to your web site.</p>
<p><strong>What Privacy Policies Contain<br /></strong>Your site&#8217;s privacy policy must contain information about:</p>
<ul class="unIndentedList">
<li>What information you collect on your web site</li>
<li>How you store it online and offline</li>
<li>How long you store it in your system</li>
<li>What you do with the information</li>
<li>Whether you share it associates and partners and why</li>
<li>Whether you sell it to mailing list companies and under what circumstances</li>
<li>How users can alter or remove their information from your database</li>
<li>Whether users can opt out of their information being collected</li>
<li>Whether you allow third parties, such as advertisers, to collect user information from your site</li>
<li>What users can do if they find that your site is in violation of the stated privacy policy and the contact information of people responsible for resolving these issues </li>
</ul>
<p><strong>How to Generate and Post Privacy Policies</strong><br />Unless you are lawyer, you may find it difficult to draft such a policy. It is a good idea to have a lawyer draft it, or at least look it over. But if you don&#8217;t want to hire one for whatever reason, you may want to look at the privacy policy generator on Direct Marketing Association&#8217;s web site. You can find it at <a href="http://www.the-dma.org/privacy/creating.shtml">http://www.the-dma.org/privacy/creating.shtml</a>.</p>
<p>The generator asks you to provide some basic contact information and then answer a few multiple-choice questions about how user data is collected on your site and what you do with it. After you check the applicable options, the generator produces a privacy policy document in HTML which you can cut and paste on your site.</p>
<p>Once you create a privacy policy, make sure that your users can find it easily. People typically look for privacy policies in the About Us section, in the footer, on sign-up or login pages, and on shopping cart check out pages. Put a link to your privacy policy at these locations or pages.</p>
<p><strong>Managing Changes to Privacy Policy</strong><br />You can&#8217;t forget about the privacy policy once you create it. Web sites change over time and the changes may affect the privacy policy. Therefore, whenever you make a change to your web site, you must ensure that the change complies with your stated privacy policy. If it doesn&#8217;t, you must alter the policy and inform the users by prominently displaying a notice to that effect on the privacy policy page on your site. For example, let us say your privacy policy states that your site does not allow third parties to place cookies on the user&#8217;s computer. If you then want to hook up with an advertiser that sends down third party cookies, you must either reconsider the alliance or change your privacy policy.</p>
<p><strong>Machine Readable Privacy Policies</strong><br />If you think writing privacy policy is difficult, imagine how difficult it must be for users to read and understand privacy policies of scores of sites. To get around this problem the World Wide Web Consortium (W3C), the web&#8217;s standards body, decided to incorporate machine readable privacy policies into its standards. It came up with a specification called Platform for Privacy Preferences (P3P).</p>
<p>New browsers such as Internet Explorer 7 have built in support for P3P. You can click Web Page Privacy Policy &hellip; on IE 7&#8242;s View menu and a dialog box such as one in Figure 1 pops up.</p>
<p align="center"><a href="/images/small business spotlight/privacypolicy/Figure 1.gif"><img src="/images/small business spotlight/privacypolicy/figure 1_125_89.gif" /></a><br /><em>Figure 1: Web Page Privacy Policy in IE 7</em></p>
<p>If you click the Summary button after selecting the site or one of the pages in the dialog box, a summary of the applicable privacy policy pops up in a new window, as shown in Figure 2.</p>
<p align="center"><a href="/images/small business spotlight/privacypolicy/Figure 2.gif"><img src="/images/small business spotlight/privacypolicy/figure 2_125_89.gif" /></a><br /><em>Figure 2: Privacy Policy Summary</em></p>
<p>As you can see, this summary is a lot easier to read than a legal document with lots of hereinunders and thereinafters.</p>
<p><strong>Generating P3P Documents</strong><br />P3P documents are written in eXtensible Markup Language (XML). XML is even more tedious to write by hand than legalese. Fortunately, there are many editors which can generate P3P documents. Most of them require you to pay a fee, but a complimentary 90-day evaluation version one is available from IBM at http://www.alphaworks.ibm.com/tech/p3peditor.</p>
<p>A Web page at <a href="http://www.oreillynet.com/pub/a/network/excerpt/p3p/p3p.html?page=2">http://www.oreillynet.com/pub/a/network/excerpt/p3p/p3p.html?page=2</a>&nbsp;describes&nbsp;how P3P works and how to use IBM&#8217;s P3P editor to generate and deploy P3P policy documents.</p>
<p>If you don&#8217;t want to install software or try to understand the various P3P options, several paid P3P generators are available on the Web. You can look for them by typing &quot;P3P generators&quot; in Google.</p>
<p>A good, easy to understand privacy is key to reassuring visitors and customers that their information is in safe hands. Make sure your web site has one.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/a-sound-privacy-policy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Defense In-Depth</title>
		<link>http://www.pcmech.com/article/defense-indepth/</link>
		<comments>http://www.pcmech.com/article/defense-indepth/#comments</comments>
		<pubDate>Thu, 12 Apr 2007 12:00:00 +0000</pubDate>
		<dc:creator>Rahul Pitre</dc:creator>
				<category><![CDATA[Business Center]]></category>

		<guid isPermaLink="false">http://480607789</guid>
		<description><![CDATA[Security can be confusing.  Rahul outlines what to do and that less is more.]]></description>
				<content:encoded><![CDATA[<p>Last weekend, a friend gave me a frantic SOS call. His computer was taking for ever to start up. Once it started, it took for ever to start an application. So he tried to reboot it. It took for ever to shut down. And my friend went on for ever telling me what his computer took for ever to do.</p>
<p>A quick visit over to his place revealed the problem: he had enabled Windows firewall, installed the entire McAfee security suite, had another anti-spyware program running just in case, had parental controls turned on, and had an assortment of pop-up blockers and anti-phishing toolbars. And he still wondered whether his computer was secure enough.</p>
<p>My friend is not alone. Almost everyone is paranoid about security these days. I know it&#8217;s a bad, bad world, but all these products and services with a prefix of anti are driving me crazy. Every year security suites add a couple of new &quot;anti&quot;s. I have three problems with this trend: </p>
<ol>
<li>Security companies are cramming security suites with so many products that few people understand what they are installing. They are fuelling fears among users rather than making them feel secure. I saw an identity-theft protection feature in one security suite. On closer scrutiny, it turned out to be an offer for a credit-report monitoring service. Now what does a credit report have to do with security of your computer? People want to install security software to prevent bad things happening to their computers; not to their credit histories. At this rate, you will find security monitoring for your home and a donation to the Police Benefit Association bundled with 2009 version of security suites.&nbsp; </li>
<li>There is so much overlap among applications that it is almost impossible to have only one of each &quot;anti&quot; on your computer. So people end up having many of each variety on a single computer. Take pop-up blockers for example. Everyone has more than one.</li>
<li>People think, erroneously, that two security suites are better than one and install them anyway. And after a while, they invariably end up being in my friend&#8217;s predicament.</li>
</ol>
<p>Running multiple security suites on your computer may actually do more harm than good because one application may interfere with what another is doing. The right approach is to layer your security in order to eliminate threats at different levels. </p>
<p>Here is the approach I like to take. I like to think of my data to be surrounded by four concentric walls. To get to my data, an intruder would have to get past these walls one after another. If I can beef up security at each of the walls, I won&#8217;t need six security suites to protect my computer. Not only will I have a more secure environment, my computer will hum along quite nicely.</p>
<p><strong>First Wall: The Network</strong><br />At this level are:</p>
<ol>
<li>A wired or wireless firewall router with Stateful Packet Inspection (SPI) capabilities. The router does three things:
<ol>
<li>It checks every data-packet passing through it. Packets that originate on my network or are requested from my network are allowed to pass through. Others are discarded</li>
<li>It hides IP addresses of my computers and makes them invisible to bad guys on the Internet. This is called Network Address Translation or NAT</li>
<li>If utilizing a wireless connection, it secures Wireless access to my network with WiFi Protected Access (WPA) security protocol</li>
</ol>
</li>
<p>When you buy a router, make sure it has these features.</p>
<p>
<li>Spam and virus filtering service for the e-mail server. This is to ensure that unwanted messages and harmful attachments are quarantined before reaching your network.</p>
<p>Make sure you have turned on spam and virus filtering on your mail service. If your mail service doesn&#8217;t offer these features, move over to one that does.</li>
</ol>
<p><strong>Second Wall: The Computer</strong><br />If something undesirable gets past the first wall, it has to deal with a software firewall, an anti-virus application, an anti-spyware application, and an application which protects from instant messenger and e-mail threats on the client side. It is easier to manage these applications in a single suite rather than buying them individually.</p>
<p>I like CheckPoint&#8217;s ZoneAlarm security suite because</p>
<ol>
<li>Unlike McAfee&#8217;s and Symantec&#8217;s suites, it can be uninstalled cleanly and easily</li>
<li>It doesn&#8217;t grind your computer to a halt by hogging memory</li>
<li>You can turn off applications you don&#8217;t want</li>
</ol>
<p>If you think McAfee&#8217;s or Symantec&#8217;s suite is better, don&#8217;t send me hate-mail. Go ahead and install your favorite suite. Just make sure that you:</p>
<ol>
<li>Install only one suite</li>
<li>Disable Windows firewall (In my friend&#8217;s case, Windows put a bright red icon in the system tray insisting that he turn it on. So he did!)</li>
</ol>
<p>Also make sure that Windows as well as your security suite receive patches and updates regularly.</p>
<p><strong>Third Wall: The Communication Pipe</strong><br />It is equally important to secure data traffic to and from your computer to protect it from bad guys who can peek into what goes over the wire with applications called sniffers. The best way to do so is to encrypt your communication. </p>
<p>You only need to encrypt important information such as bank account numbers, credit cards, social security numbers, and highly personal information. Typically you would use a browser for this purpose. Always use secured pages to transmit such data. You will know that pages are secure when your browser displays a little lock in the title or the status bar depending on its version. The address of the web pages will start with https:// instead of the usual http://. Check the certificate on the site to make sure the site is authentic.</p>
<p>If you use your browser to read e-mail, check whether your mail service lets you access it securely. If it does, access your mail securely whenever you can.</p>
<p>And watch out for phishing sites. The latest versions of browsers have anti-phishing features built in. If you are using an older browser, you will need to get a security suite which has phishing filters.</p>
<p>Turn on the pop-up blocker in your browser. You don&#8217;t need more than one. If you have one in your security suite, you may want to use that one. But I prefer the one in the browser because it is easier to turn on and off.</p>
<p><strong>Fourth Wall: The Data Shield</strong><br />If someone with a malicious intent manages to get past all the other barriers, you must prevent him from getting access to your data. The best way to do so is to encrypt critical it. You can either use built-in Windows features or use an application such as TrueCrypt. Make sure that you use a strong password to encrypt the data.</p>
<p>That&#8217;s all there really is to security. When you analyze the problem logically, you will have more confidence in the measures you have taken. You won&#8217;t be tempted to load up your computer with many different security suites.</p>
<p>&nbsp;Not only will it save you money, it will also save you time and give you peace of mind.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/defense-indepth/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Taming the Cookie Monster</title>
		<link>http://www.pcmech.com/article/taming-the-cookie-monster/</link>
		<comments>http://www.pcmech.com/article/taming-the-cookie-monster/#comments</comments>
		<pubDate>Thu, 29 Mar 2007 12:00:00 +0000</pubDate>
		<dc:creator>Rahul Pitre</dc:creator>
				<category><![CDATA[Business Center]]></category>

		<guid isPermaLink="false">http://127605011</guid>
		<description><![CDATA[Rahul takes a look a cookies, what they do, and how they can sometimes be harmful]]></description>
				<content:encoded><![CDATA[<p>The web is just not a safe place any more. People take all sorts or measures to protect themselves from online threats &#8212; firewalls, antivirus and anti-spyware software, phishing filters, popup blockers, anonymizers, and anything &quot;anti&quot; that I may have forgotten; you name it, people have installed it. But even after all these fortifications something that you willingly allow on your computer may ultimately compromise your personal information &#8212; cookies.</p>
<h3>What is a cookie?</h3>
<p>A cookie is a small text file that a web site can put on your computer for storing information for specified amount of time, and sometimes even indefinitely (or at least until you get rid of it manually).</p>
<p>Web sites use cookies because, unlike desktop applications, they can&#8217;t &quot;remember&quot; information across pages. One web page can write information to a cookie, and another can read it before loading to give you an impression that the site indeed remembers your information.</p>
<p>Cookies can store innocuous information such as your color and font preferences, or highly personal information such as your credit card number. Therefore, browsers only allow web sites to access that they issued. A web site can&#8217;t access cookies issued by another web site. </p>
<h3>Types of Cookies</h3>
<p>Cookies come in several kinds:</p>
<p><strong>Session Cookies</strong><br />These cookies are sent back and forth between your browser and the web server on which the site you are currently viewing sits. These cookies are useful in storing information across web pages. For example, when you log in to a web site, your user ID may be stored in a session cookie so that you don&#8217;t have to identify yourself to the web server on every page. Or they may be used to store the items you have already added to your shopping cart until you decide to check out. Session cookies are generally harmless, and as you can see, even desirable.</p>
<p>Session cookies are alive only while you are connected to the web server that issued them. When the connection to the web server is broken, session cookies are lost. But remember that when you surf away from a web site, your session may not necessarily be over. You will have to close your browser to end the session.</p>
<p><strong>Persistent Cookies</strong><br />These cookies can be stored on your computer for extended periods of time. Persistent cookies have a timeout setting, which web site developers can set. A cookie can be made to stay on your computer for a period of time specified by that setting. </p>
<p>Persistent cookies are useful in many ways. Let&#8217;s say you visit an online store and add a few items to your shopping cart, but hesitate before checking out. By storing your items in persistent cookies, the site can allow you to quickly check out later, without having to add the items to the cart all over again. Another common example is the &quot;Remember me&quot; option for logging in to web sites. When you check the little box, your login credentials are stored in a cookie. The next time you go back to the log in page, your credentials are fetched from the cookie so that you don&#8217;t have to log in again. Web sites that use persistent cookies will generally specify how long they will store your information &#8212; the time out period &#8211; in their privacy policy.</p>
<p><strong>First-party Cookies<br /></strong>First-party cookies are cookies that are sent to your computer by the web site you visit directly. If you point your browser at Amazon.com, and the site sends you a cookie, it is a first-party cookie.</p>
<p><strong>Third-party Cookies</strong> <br />Third-party cookies are sent to your computer by a site you did not visit directly. Say you visit Amazon.com. Amazon may have sold advertising space on its site to a third party. The advertisements are pulled in dynamically when the page is loaded. In other words, the advertisement doesn&#8217;t come to your browser from Amazon.com; it comes from the advertiser&#8217;s site. The advertiser also may send a cookie to your computer, which becomes a third-party cookie.</p>
<p>Typically, only the web site that issues a cookie has access to it. This scheme of things makes sure that information you provide to one web site can&#8217;t be accessed by another. But if an advertiser advertises on several sites, its cookie can track your movements on all those sites. Well-meaning third-party cookie issuers will not use the information they store for insidious purposes behind your back, but the fact that it can be done at all, is the reason that makes third-party cookies dangerous.</p>
<p><strong>Unsatisfactory Cookies</strong><br />When something can be done from a technical point of view, it is only a matter of time before someone will do it even if it is ethically wrong. Naturally, you can expect at least some of the third-party cookies to breach your trust. Such cookies allow access to your private information behind your back.</p>
<p><strong>Girl Scout Cookies<br /></strong>Girl Scout cookies are issued by little girls in brown vests&hellip;. </p>
<p>Just kidding! Girl Scout cookies have nothing to do with your browser. They may clog your arteries, but they don&#8217;t compromise your personal information. Unsatisfactory and third-party cookies are the ones you have to be weary of, if you want to guard your personal information. You can do so by choosing the cookie settings in Internet Explorer wisely.</p>
<p><strong>Setting Cookie Preferences in Internet Explorer 7 (IE)</strong><br />Cookie preferences in IE are set on the privacy tab of Internet Options. To access them, pull down the Tools menu, choose Internet Options, and in the window that pops up, click on the Privacy Tab. A vertical slider control lets you set cookie preferences. As you slide the control down, the settings change from <strong>Block All Cookies</strong> at the top to <strong>Allow All Cookies</strong> at the bottom, and everything in-between. Now that you are compliant with all cookie buzzwords, you can read the description alongside the slider to make your selection.</p>
<p>You can further customize your settings by clicking on the <strong>Sites</strong> button just below the slider. In the windows that pops up, you can specify sites that you trust unconditionally by always allowing cookies from them and sites that you want to avoid like a plague by always blocking cookies from them.</p>
<p>When you choose settings by sliding the slider control, you accept the combination of cookie settings that each level specifies. If you are too picky, you may not like this automatic handling of cookies by IE. In that case, you can click on the adjacent <strong>Advanced</strong> button to choose the precise combination of various kinds of cookies to allow or disallow.</p>
<p>If after fiddling around with the settings, you find that you have landed yourself in a big mess, you can click the <strong>Default</strong> button to restore the settings to whatever they were when IE was installed on your computer.</p>
<p><strong>Which Cookie Setting is Optimum?</strong><br />There is no such thing as optimum cookie settings. If you block all cookies, you will probably have to limit your surfing to the original physics reports at CERN that the web was invented to share; almost all modern sites use cookies of some sort. If you accept all cookies, you may soon have imposters claiming to be you all around the world. Like many other aspects of the Internet, you have to strike a balance between safety and usability.</p>
<p>The <strong>Medium-high</strong> setting on the slider usually strikes a good balance. But you may need to adjust the settings depending on your specific needs.</p>
<p>It is a good idea to clear cookies periodically from the <strong>General</strong> tab of Internet Options by clicking on the <strong>Delete&hellip;</strong> button and then clicking on <strong>Delete Cookies&hellip;</strong> button in the window that pops up. </p>
<p>No cookie setting can protect you from all threats all by itself, but it is an important component of a defense-in-depth protection strategy that includes a firewall and all the &quot;anti&quot;s that I referred to at the beginning.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/taming-the-cookie-monster/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>9 Steps to Combat Spam</title>
		<link>http://www.pcmech.com/article/9-steps-to-combat-spam/</link>
		<comments>http://www.pcmech.com/article/9-steps-to-combat-spam/#comments</comments>
		<pubDate>Wed, 21 Mar 2007 12:00:00 +0000</pubDate>
		<dc:creator>Rahul Pitre</dc:creator>
				<category><![CDATA[Business Center]]></category>

		<guid isPermaLink="false">http://1385641571</guid>
		<description><![CDATA[Rahul offers actions you can take to cut down on spam]]></description>
				<content:encoded><![CDATA[<p>Despite steps that everyone seems to be taking against it, e-mail spam shows no signs of abetting. As methods to counter spam get more sophisticated, so do spammers. Here is a concise guide to combating them.</p>
<p><strong><br />Choose e-mail service provider that filters spam on the server</strong><br />If your ISP does not filter spam at the server level, it is time to give it a boot. If you don&#8217;t want to do so, for whatever reason, you should at least move your mail service to a service such as <a href="http://domains.live.com/">Windows Live Custom Domains</a>&nbsp;or <a href="http://www.google.com/a/cpanel/domain/new">Google Apps</a> which offer free custom domain mailboxes. If you don&#8217;t mind spending a few dollars every month, consider premium versions of these services. With premium versions, you can avoid viewing advertisements while viewing your mail.</p>
<p><strong><br />Consider a third party spam and virus filtering service</strong><br />Third party services <a href="http://defender.mailstreet.com/">such as Defender</a>, many of which are based on MX Logic&#8217;s filtering technology, allow you to keep your existing mail service and still have your mail filtered for spam and viruses for a small monthly charge. These services are ideal if you your ISP provides you less than optimal service, but you still can&#8217;t or won&#8217;t move your mail.</p>
<p><strong><br />Turn on junk-mail filter on your mail client</strong><br />If your e-mail client has a junk-mail filter, turn it on. Then,</p>
<ol>
<li>Whenever you receive spam in your mailbox add the sender to the blocked sender&#8217;s list.</li>
<li>Some mail clients like Outlook will allow you to block messages based on the top level domain extension. If you don&#8217;t expect to receive messages from Mongolia, Afghanistan, or Romania, for example, you can block those extensions out.</li>
<li>Mail clients like outlook also allow you to block messages based on encoding. Again, if you don&#8217;t expect messages in Arabic or Vietnamese, you can safely block them out</li>
</ol>
<p><strong><br />Turn off message acknowledgements if your e-mail client allows it</strong><br />Many senders, often for no reason, request delivery receipts and read receipts for every message they send. E-mail is a pretty reliable medium of message delivery. Other than legal proof, the only purpose message acknowledgements serve is to acknowledge the active status of your mailbox. Turn the acknowledgements off.</p>
<p><strong><br />Use Out of Office messages judiciously</strong><br />While &quot;I am out of office till such-and-such date. I will reply to your mail when I am back.&quot; messages are good for informing senders of your absence, they also notify spammers that your account is active.</p>
<p><strong><br />Protect your e-mail address online</strong></p>
<ol>
<li>Don&#8217;t publish your e-mail address on your web site or post it in news groups. Bots that harvest e-mail by scraping web pages can find it and add it to mailing lists that spammers use. Provide a contact form on your web site it possible, which obviates the need to publish your e-mail address. If you can&#8217;t avoid publishing it, publish it as me**AT**mydomain.com or something similar instead of me@mydomain.com. People looking at your coded address can understand it and make the necessary changes to send you mail, but bots can&#8217;t harvest it. </li>
<li>Don&#8217;t sign up for newsletters or open accounts at sites you are not familiar with or don&#8217;t trust. If you must sign up, don&#8217;t forget to check (or uncheck, as the case may be) the box that prevents the site-owner from sharing your e-mail address or sending you mail that you haven&#8217;t specifically asked for.</li>
</ol>
<p><strong><br />Protect your e-mail address offline</strong><br />Service providers such as your bank, insurance company, and utility companies send you a privacy policy statement every year. These statements are worded in such a way that the onus to opt out of receiving promotional e-mail from &quot;partners&quot; is on you. Be sure to check the opt-out boxes and mail the form back to them, or opt out over an automated phone line if you have the option of doing so.</p>
<p><strong><br />Beware of &quot;Unsubscribe&quot; e-mails</strong><br />&quot;If you don&#8217;t wish to receive communication from us, please reply to this message with &#8216;Unsubscribe&#8217; in the subject line&quot; is common text you see on unwanted messages. Reply to such messages only if you know the sender. Such messages from unknown senders do little more than confirming to spammers that your mailbox is active.</p>
<p>And when some spam invariably slips through to your mail box&#8230;</p>
<ol>
<li>Don&#8217;t open it. Especially if it has attachments.</li>
<li>Even if a message appears to be from someone you know but has attachments you are not expecting, don&#8217;t open it.</li>
<li>If you must open it, open it when you are offline. Doing so will prevent pixel tracking verification of your mailbox being active. Spammers, who employ pixel tracking verification, embed an image from their server into their message. When you open the message, your mail client will fetch the image from the server and the spammer will know that your account is active.</li>
<li>Don&#8217;t open messages that proclaim that &quot;Your payment has been received&quot; or &quot;Your loan application has been approved&quot; if you haven&#8217;t paid anyone or applied for a loan.</li>
<li>Whenever you receive a message with a link in it, especially if it appears to be from a legitimate sender such as PayPal or your bank, DON&#8217;T click on the link. Open a new browser window, and type in the URL of the entity in question. The link may just be a ploy to separate you from your private information.</li>
<li>Spam that manages to slip through the cracks despite all your precautions may contain viruses that could turn your computer into a sender of spam. You should have a second line of defense in the form of properly configured firewall and antivirus software.</li>
</ol>
<p><strong><br />Get Even</strong><br />Lastly, don&#8217;t hesitate to report spam to the sender&#8217;s ISP, or free e-mail service providers such as Google, MSN, and AOL. It may not bring immediate results, but it will give you the satisfaction of doing your bit in combating spam.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pcmech.com/article/9-steps-to-combat-spam/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Page Caching using xcache
Object Caching 753/855 objects using xcache
Content Delivery Network via cdn.pcmech.com

 Served from: www.pcmech.com @ 2013-05-15 23:52:16 by W3 Total Cache --