Sunday, November 25, 2012

Playing Games on Local Host

I copied the Raze HTML files into my documents so I could play it offline in case of  power outage or Internet disconnection.That's when I learned about Local Hosting Network. It refers to the local computer that a program is running on. For example, if you are running a Web browser on your computer, your computer is considered to be the "localhost."

Opinions about Local Hosting Network (LHN) in contrast to Online Hosting Network (OHN):  
Local Hosting Network
A supposedly "zero drag" network connection to a gaming server achieved because of the lack of internet dependency. Game play is naturally much smoother on a Local Hosting Network.


Online Hosting Network
An network connection to a gaming server characterized by drag that may interfere with gaming performance.
People claim that the drag from the Online Hosting Network is noticeable enough to interfere with game play, but I do not agree. I can't tell the difference between playing on an OHN and a LHN.
Any opinions of your own?


Install Portable Apps to Dropbox
Xinorbis is a disk analyzer for Windows file system. I'm using it as an example just to prove you can install portable apps to Dropbox. Go to Xinorbis .com and try.

Tuesday, November 13, 2012

How to Hide and be Private On-line

English: A screenshot of Vidalia running under...
English: A screenshot of Vidalia running under KDE. (Photo credit: Wikipedia)

How to Hide and be Private On-line
Most of the methods taught here should be done with guidance from a technician. If you're not a geek or techie, you will surely endanger your PC without it. Also, most of the tools and apps I mentioned or recommended here are freeware. And although they are efficient enough, I suggest you use the paid versions for more efficiency.

1. Use a Virtual Private Network (VPN)
With a VPN, your IP address is hidden
Most techies endorse TOR VPN. But recently, a cybergang successfully used it to hide their racket and tarnished TOR's name. Some good alternatives to TOR are Hamachi and CyberGhost.

2. Use an Anonymized Browser
Websites use cookies to track you and hackers to ID you. To prevent that, use a particular browser (I use Firefox) and set it to wipe cookies every time you close the browser.

3. Use a Web Proxy
I really don't use proxies because operating systems and websites make it hard to use. But if you want to, some apps you can try are Privoxy, Anonymouse, Proxify, and Hide My Ass.  

4. Turn Off Internet When You Can Work Offline
Getting tracked and hacked is easier when you are online. One of my tiny and most useful app is InternetOff. With just two clicks, you turn Internet on and off.

5. Use an External Disk
On-line data is getting more and more easier to hack and that's where external backups become useful - no one can see them online. You don't even have to buy big-sized external disks. There are megaload USB sticks available now which have up to 64GB capacity. Imagine too if you have no external backup and all your files online suddenly vanished for some freak reason.

6. Control Cookies
Instead of anonymizing a browser, you can just control the cookies it accumulates. But even tech gurus are divided on whether it's worth deleting cookies. One thing I'm sure of: deleting them will speed up your PC.

And here's a warning: be careful what cookies you delete or you might find your unfinished online data and your saved games gone. Whenever I delete Firefox cookies, my saved online game on Opera gets deleted too! I'm not sure yet how that happens but I saved the game as an HTML doc so I can play it offline.

7. Use HTTPS
Simply use HTTPS instead of just HTTP. You can automatically do that now with all major browsers. But again, just like with controlled cookies, you won't be able to connect to some legit websites if you use it.  

8. Encrypt your Data and Disks
Even strong passwords and firewalls are getting easier to hack now. Solution: disk encryption. Encrypt your data first before moving it to be extra safe. I use AxCrypt for documents and TrueCrypt for disks.
These last methods are strictly for the computer-savvy so don't try them without guidance

9. Use Steganography
Steganography is another form of encryption but which is stricter and more complicated. Visit OpenPuff to get an idea of how to do steganography.

10. Create a Tails Boot Disc
This is about turning your PC into an encrypted and private operating system. With a tails boot disc (or USB), you will leave no trace of your ID and whatever you did. Lifehacker has a great tutorial on this.
Definitely Optional
Commit Internet Suicide and Disappear from the Web Forever
Again, see how at Lifehacker

Enhanced by Zemanta