Sunday, November 25, 2012

Playing Games on Local Host

I copied the Raze HTML files into my documents so I could play it offline in case of  power outage or Internet disconnection.That's when I learned about Local Hosting Network. It refers to the local computer that a program is running on. For example, if you are running a Web browser on your computer, your computer is considered to be the "localhost."

Opinions about Local Hosting Network (LHN) in contrast to Online Hosting Network (OHN):  
Local Hosting Network
A supposedly "zero drag" network connection to a gaming server achieved because of the lack of internet dependency. Game play is naturally much smoother on a Local Hosting Network.


Online Hosting Network
An network connection to a gaming server characterized by drag that may interfere with gaming performance.
People claim that the drag from the Online Hosting Network is noticeable enough to interfere with game play, but I do not agree. I can't tell the difference between playing on an OHN and a LHN.
Any opinions of your own?


Install Portable Apps to Dropbox
Xinorbis is a disk analyzer for Windows file system. I'm using it as an example just to prove you can install portable apps to Dropbox. Go to Xinorbis .com and try.

Tuesday, November 13, 2012

How to Hide and be Private On-line

English: A screenshot of Vidalia running under...
English: A screenshot of Vidalia running under KDE. (Photo credit: Wikipedia)

How to Hide and be Private On-line
Most of the methods taught here should be done with guidance from a technician. If you're not a geek or techie, you will surely endanger your PC without it. Also, most of the tools and apps I mentioned or recommended here are freeware. And although they are efficient enough, I suggest you use the paid versions for more efficiency.

1. Use a Virtual Private Network (VPN)
With a VPN, your IP address is hidden
Most techies endorse TOR VPN. But recently, a cybergang successfully used it to hide their racket and tarnished TOR's name. Some good alternatives to TOR are Hamachi and CyberGhost.

2. Use an Anonymized Browser
Websites use cookies to track you and hackers to ID you. To prevent that, use a particular browser (I use Firefox) and set it to wipe cookies every time you close the browser.

3. Use a Web Proxy
I really don't use proxies because operating systems and websites make it hard to use. But if you want to, some apps you can try are Privoxy, Anonymouse, Proxify, and Hide My Ass.  

4. Turn Off Internet When You Can Work Offline
Getting tracked and hacked is easier when you are online. One of my tiny and most useful app is InternetOff. With just two clicks, you turn Internet on and off.

5. Use an External Disk
On-line data is getting more and more easier to hack and that's where external backups become useful - no one can see them online. You don't even have to buy big-sized external disks. There are megaload USB sticks available now which have up to 64GB capacity. Imagine too if you have no external backup and all your files online suddenly vanished for some freak reason.

6. Control Cookies
Instead of anonymizing a browser, you can just control the cookies it accumulates. But even tech gurus are divided on whether it's worth deleting cookies. One thing I'm sure of: deleting them will speed up your PC.

And here's a warning: be careful what cookies you delete or you might find your unfinished online data and your saved games gone. Whenever I delete Firefox cookies, my saved online game on Opera gets deleted too! I'm not sure yet how that happens but I saved the game as an HTML doc so I can play it offline.

7. Use HTTPS
Simply use HTTPS instead of just HTTP. You can automatically do that now with all major browsers. But again, just like with controlled cookies, you won't be able to connect to some legit websites if you use it.  

8. Encrypt your Data and Disks
Even strong passwords and firewalls are getting easier to hack now. Solution: disk encryption. Encrypt your data first before moving it to be extra safe. I use AxCrypt for documents and TrueCrypt for disks.
These last methods are strictly for the computer-savvy so don't try them without guidance

9. Use Steganography
Steganography is another form of encryption but which is stricter and more complicated. Visit OpenPuff to get an idea of how to do steganography.

10. Create a Tails Boot Disc
This is about turning your PC into an encrypted and private operating system. With a tails boot disc (or USB), you will leave no trace of your ID and whatever you did. Lifehacker has a great tutorial on this.
Definitely Optional
Commit Internet Suicide and Disappear from the Web Forever
Again, see how at Lifehacker

Enhanced by Zemanta

Friday, October 19, 2012

Real Nasty Apps to Avoid

Yesterday, I ran ESET Online Scanner and was surprised when ESET found a threat - YouTube Downloader - that two of my other AVs had already deleted. It was only a 'threat' but the fact that it keeps coming back makes it a major threat that should be destroyed. And again, 2 of these threats came from Cnet downloads

Here's the ESET scan result:
C:\Program Files\Direct YouTube Downloader\nv.exe a variant of Win32/Somoto.A application cleaned by deleting - quarantined
C:\Users\Pocholo Peralta\Downloads\cnet_iecv_zip.exe a variant of Win32/InstallCore.D application cleaned by deleting - quarantined
C:\Users\Pocholo Peralta\Downloads\cnet_setup_listen_n_write_free_1_2_0_2_exe.exe a variant of Win32/InstallCore.D application cleaned by deleting - quarantined
C:\Users\Pocholo Peralta\Downloads\freefileviewer_518.exe a variant of Win32/InstallIQ application cleaned by deleting - quarantined
C:\Users\Pocholo Peralta\Downloads\installfreefileopener_553.exe a variant of Win32/InstallIQ application cleaned by deleting - quarantined
C:\Users\Pocholo Peralta\Downloads\Unlocker1.9.1.exe Win32/Adware.ADON application cleaned by deleting - quarantined
C:\Users\Pocholo Peralta\Downloads\YouTubeDownloaderSetup33.exe a variant of Win32/Toolbar.Widgi application cleaned by deleting - quarantined

Sunday, October 14, 2012

Power of We

I'm taking part in this year’s Blog Action Day so netizens can have the idea of using crowdsourcing for empowering ourselves. That is what The Power of We means to me. http://blogactionday.org/

On-line People Power According to experts, social media has become the main media source for hundreds of millions of people(infographic link below) 
Crowdsourced Disaster Response (CDR) can be used in politics (for both good and bad) and for volunteer public service. And crowdsourcing simply means using social media to ask for support for a particular social event. The best example to me is the live case of Rimsha Masih -- the 9-year-old girl who was framed for blasphemy by a Pakistan Imam and sentenced for execution (link) http://www.reuters.com/article/2012/09/02/us-pakistan-blasphemy-girl-idUSBRE88101320120902 Before the Imam was caught, Rimsha's father 'crowdsourced' an Avaaz.org petition to save his daughter from execution (link) That's one good example of CDR or crowdsourcing.

Propagandas in Social Media 
Now to the bad examples. iRevolution.net used the ousting of former Philippine President Joseph Estrada as an example of successful Crowdsourced Disaster Response. I'm not saying that iRevolutions example is bad. What I want to say is that the ousting of the former Philippine President was bad crowdsourcing. My proof? The ex-President Arroyo who instigated the rebellion against Estrada was proven more corrupt and was legally impeached for corruption. When ex-President Marcos suffered the same of Estrada, online crowdsourcing didn't exist yet but that is another bad example of people power. I'm still deeply regretting that I was lured to risk my life and join the rebels against Marcos. Filipinos didn't learn from that lesson and repeated with Estrada. iRevolution link Infographic link

Crowdsourcing for Business 
Is Social Media Ruining Marketing? According to Alex Goldfayn, CEO of the Evangelist Marketing Institute, it is. Social media and networking 'has spawned a generation of young professionals who talk instead of listen.' He suggests that they should identify their audience, understand what motivates them, and develop powerful messaging to address those motivations instead.