Showing posts with label spyware. Show all posts
Showing posts with label spyware. Show all posts

Wednesday, October 19, 2011

Types of VPN Connections

Virtual private networking is heavily used in business. In fact, you probably have used a VPN connection today without even realizing it. It’s not a belt and suspenders service anymore. VPN connections are absolutely essential to prevent being robbed blind.

Virtual Private Networking provides security at a reasonable cost...First, let’s take a look at private vs virtually private networks. Your hardwired LAN is a private network. It would take some real effort and a lot of risk for someone to tap into your network wiring and install a device to capture traffic. The same is true if you establish a wide area network or WAN using point to point private lines. A PTP T1 line falls into that category. While it is not impossible to sneak into your wiring closet or even the telephone company and put a tap on the line, it is so difficult that only those with the most secure requirements will go to extremes to protect against this type of attack.

What distinguishes a private network is that 100% of the traffic is yours and yours alone. You are not sharing the lines with anyone else. The advantage to a private network is inherent security. The disadvantage is cost. You pay for all the construction, maintenance and monthly lease fees. It’s unlikely that your private network will be fully loaded at all times. Whatever capacity is unused goes to waste.

Contrast the private network with a public network like the Internet. They are polar opposites. The Internet allows anyone and everyone access by design. Traffic on the Internet is everybody in the pool. Your packets are intermingled with everyone else’s. Even so, a wired connection to the Internet isn’t the worst situation. That belongs to the unsecured wireless network. No need to plant malware in someone’s computer when everything they are doing is perfectly visible on any WiFi enabled computer within range. You are most vulnerable reading private unencrypted emails in a popular public hotspot. Anyone with a laptop computer and some easy to obtain spyware can be reading your messages right along with you.

It seems like such a crying shame that the one network that any employee can access at home or while traveling is such a security nightmare. That’s where the technique of encryption becomes valuable. It doesn’t matter if someone is monitoring your traffic if all they see is gibberish. You encrypt your message at one end and decrypt it at the other end and you have a created what is known as a secure tunnel through the Internet. The public network has now become a virtually private network. It’s not a private network because you are still sharing the transport with many others. It’s virtually private because no one can read your traffic and make any sense out of it.

There are two popular methods of creating Internet or IP VPNs. One is IPsec or Internet Protocol security. The other is SSL or Secure Socket Layers. IPsec is based on software installed in both the company server and the client computer. IPsec encrypts and decrypts each packet, so once you have it installed you have a virtually private line to the company no matter where you hooked to the Internet. Of course, you need to use the specific laptop or other computer set up to work with this system. You can’t just go to any computer and connect back to headquarters.

If you want to do that, you need SSL (Secure Socket Layer). The beauty of SSL is that the software is already built into Web browsers and some email programs. SSL has been popularized for ecommerce and online banking. When you go to a SSL enabled webpage, you’ll notice that the http:// has become https:// The “s” means secure page. To access it you need a user account ID and a password at a minimum. Some sites go further and ask personal challenge questions or display special graphics that give you confidence you are logged into the correct site.

For corporate wide area networks, an alternative to private lines is the MPLS network. These are multi-tenant networks that spread the cost of building and running the system among many users. MPLS networks are considered VPNs because they use a proprietary label switching protocol that isn’t compatible with IP tools. This unique protocol plus access controlled to a limited number of business clients and not the general public give MPLS networks an enhanced level of security.

Do you need private or virtually private network connects to conduct business? If so, compare VPN options and prices to help decide which mix of network techniques is right for your company.

Click to check pricing and features or get support from a Telarus product specialist.




Follow Telexplainer on Twitter

Thursday, May 28, 2009

Have Your Computer Repaired Online

Is your computer acting wonky? There's no smoke or obvious grinding noises. Yet things don't run very well. Software is sluggish, the printer acts like it never met the PC, and the kid's notebook won't connect to the network. You could take it in somewhere, but who's got time for that? Besides, who can be without their trusty PC for a week or two? The withdrawal pains would be debilitating. Isn't there another answer?

Indeed there is. It doesn't involve buying a bunch of expensive and weighty manuals and sequestering yourself with the machine for a fortnight. In fact, it's not a do-it-yourself approach at all. Instead, you can get expert tech support through an online service that will both talk to you and work on your computer remotely.

The service is BluePhone. Tech support is their game. They hire experienced and credentialed computer technicians to run a remote help desk. Most help desks are corporate in-house services not available to individuals. BluePhone offers similar support to anyone who wants to subscribe. Once you're signed-up you have unlimited access and no problem is too trivial, no question too inane.

Telephone troubleshooting is a staple among help desks. In many cases, having an expert available to discuss a problem is all that is needed. Many problems that appear complex are just due to having made a wrong turn during installation or operation of some function. You could dig through the manuals and figure a lot of this stuff out yourself... if you had the time and patience. But you could also call someone who is more familiar with the issue and get back on track in minutes instead of hours or days.

Remote access takes telephone troubleshooting to another level. Instead of someone telling you what to do and you doing it and then reporting back what happened, a support tech can access your computer via your broadband Internet connection and actually run the system as if they were sitting right next to it. BluePhone uses Cisco WebEx remote access software to get in and troubleshoot your computer, with your permission of course.

What sort of problems can be resolved through online troubleshooting? Not serious hardware failures such as smoldering power supplies, sizzling monitors or grinding disk drives. That's where you need a local service shop, if not an cyber undertaker. What's handled by remote access or telephone consultation are software issues, network setups, and cleaning up after virus attacks or spyware invasions. If you don't quite know how to format a presentation or can't get software installed and working or the printer just sits there and won't print or one of your several computers refuses to access the Internet, then the help desk is the place for you. They're also good for things like getting music players to download tunes or calenders to sync between desktop computer and smartphone.

As it turns out, most problems aren't dire hardware failures. Indeed the majority of computers that head to the landfill or get recycled are working perfectly well. They're just too old to keep up with the rapid advances of technology. Most problems are the kind that can be resolved by an on site tech expert tickling the keyboard or by a remote technician doing the same thing.

If you think this sort of help would be of value to you, learn more about BluePhone online tech support. There is a single incident call option available, but you may well want to subscribe on an annual or monthly basis. That gives you unlimited support 24/7/365 for up to 3 computers and their peripherals. The subscription plans also include a 14 day free trial. Both PCs and Macs are supported, as well as Linux and Vista. Like you'd ever need help with Vista, right?



Follow Telexplainer on Twitter