Monthly Archives: March 2013

Beep, Beep, I have an important package

A number of organisations analyze the traffic in Kerry. Kerry County Council and the National roads Authority will analyze traffic and use the results to inform their road development strategy. Tourism development groups will also survey and analyze the traffic, to assess how long visitors are staying in an area.
In computers, the word traffic is also used, to describe data moving within a computer or moving from one computer to another. In fact, the communication channels through which data flows in a computer systems are called communication buses.
As you can imagine the amount of data flowing around the Internet rather large. With data from devices expected to reach to 11.2 extrabytes, that is 112,000,000,000,000,000,000 bytes, per month over the next four years. With over 4.2 billion users worldwide, and each one of them accessing Internet sites, posting on Facebook, tweeting, emailing to mention but a few things. Together all of these actions on the Internet are called Internet traffic.
It is a marvel, to sit and wonder, how all the traffic on the Internet is co-ordinated so that each user gets the correct results for their Google search and that each email sent arrives into the correct mailbox. The correct routing, i.e. making sure it arrives in the right place, is achieved by the Network Protocol TCP/IP. In the case of a person looking for a hotel in Dingle. They type in a search into Google. The networking software goes to work, the search is wrapped up in a network package before it is transmitted to another computer over the network. In its simplest form the package contains a header and the details of the package. The header will say where the package is going to, among other things. The speed with which this occurs is staggering to say the least.
Traffic Analysis is used by Internet Service Providers so as they can ensure a free flow of information from computer to computer. Traffic Analysis is also used by people who wish to gather information on what people are doing on the Internet. This information is valuable and people are willing to pay for it. In some cases the information is used for criminal purposes.
The simplest way to protect yourself in this area is to ensure that there is security on the network that you are using. WEP or WPA are the types of security used on wireless networks here, these will encrypt the information, so as it cannot be harvested by an outsider. Don’t make it easy for them, always use a safe network and if you have a router in your business or home ensure that there is encryption in place.

Have you this in a size 7?

Choosing a computer security system for your computer is like buying a pair of shoes. The range of shoes available, in a good shoe shop, can extend from bedroom slippers to mountain boots. The mountain boots would detract from the style of a designer dress, and the high heels would be irresponsible on the slopes of a high snow covered mountain.
If your computer is used to randomly check out things on the Internet, then you will need a full security suite to provide protection to the personal files on your computer. Rogue software, and other malware, exist on the Internet. These programmes are primed to infect any unprotected computer system. By protected I mean an active firewall and real time anti-virus scanning, which will check any file being downloaded onto the computer.
One particularly interruptive and upsetting piece of rogue software is the hard disk error virus. This virus displays a message which states that your computer has a hard disk error. The inability to access the files on the computer , will grab the attention of the computer owner. Some versions of this offer a link to an Internet site where you can download a fix for the problem. In most cases this is an attempt to retrieve money from the now terrified computer user, who believes that all his/her important files and photographs, emails and documents are now lost.
At this point there is nothing to be done but contact your local friendly computer expert to have the virus removed from the computer. This may require a lot of work, more than you might think. The first thing that needs to be done is to identify the virus, and then remove it from the computer. The details involved in this are beyond the space or the purpose of this article.
This particular virus also changes the status of files on the computer system to hidden, so even when the virus has been removed , the computer owner will not be able to view his/her files, as the operating system cannot find them. The cure for this is manageable and just takes a small bit of knowledge and a lot of time. It is a straight forward skill, to display hidden files and then remove the hidden setting from the properties of these files.
As frost bite in the feet can be, in the main, avoided by following guidelines and wearing protective footwear. Rogue and virus software can be screened and stopped. A good anti-virus system will detect and stop a virus when it tries to enter your computer system. As with the shoes, you pay for what you get, good strong protection costs money.
If you are willing to limit your computer and Internet usage to tried and trusted sites, you are less likely, but not guaranteed to avoid viruses. In this instance a free ant-virus system such as AVG, Avast and Microsoft Security Essentials with the Windows Firewall can provide protection. No anti-virus will give a 100% guarantee but, I can give you a 100% guarantee that without anti-virus protection on your computer, you will get a virus on your computer system.
The longer the virus is on your system the greater the risk of spreading it further as well as interrupting your own computer usage. You may also lose some or all of the pictures and files stored on your computer.
The method for proper computing is simple and effective; maintain your computer, keep the software up to date, have at least one backup copy of all your data, keep your anti-virus system up to date, make sure your firewall is always on.
Back to the shoes, what will it be today, the high ankle walking boots or the high heeled stilettos?