Tuesday, January 09, 2007

Firewalls

How many times you wonder should I use a firewall or what are the chances of me getting hacked? and I don't feel like paying for a software program.

Most of you know what firewall is and what it is for.
Here is a bit more information.
A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections set and configured by the organization's security policy. Firewalls can either be hardware and/or software based.
A firewall's basic task is to control traffic between computer networks with different zones of trust. Typical examples are the Internet which is a zone with no trust and an internal network which is (and should be) a zone with high trust. The ultimate goal is to provide controlled interfaces between zones of differing trust levels through the enforcement of a security policy and connectivity model based on the least privilege principle and separation of duties.
A firewall is also called a Border Protection Device (BPD) in certain military contexts where a firewall separates networks by creating perimeter networks in a Demilitarized zone (DMZ). In a BSD context they are also known as a packet filter. A firewall's function is analogous to firewalls in building construction.
Proper configuration of firewalls demands skill from the firewall administrator. It requires considerable understanding of network protocols and of computer security. Small mistakes can render a firewall worthless as a security tool. [credit goes to wikipedia]

anyways I found a bit of free firewalls so that you don't have to pay for the expensive ones and it works the same.

http://www.personalfirewall.comodo.com/ COMODO
http://www.zonelabs.com/zap26_za_grid.html zonealarm
http://www.agnitum.com/products/outpostfree/download.php Agnitum
http://www.sunbelt-software.com/Kerio-Download.cfm Kerio

Comodo is rated the best.

Now I can't tell you what are the chances of getting hacked, but isn't it much better to be safe than sorry?
I personally don't use it, but thats because i know how to keep my information safe and also I am behind a router (linksys)
if you are behind a router, check if it has a built in firewall.
I definitely recommend linksys products.
http://www.pcmag.com/category2/0,1874,1055304,00.asp
there a link for you to check out what you can buy for firewall machine.
You don't need to download just have it as if it was a router itself.

Sunday, December 31, 2006

Chat Now

I've recently set up on my website that you can chat to me live without any Instant Messaging Programs.

Just click here
I can either give you a free estimate, direct you on how to fix the PC, or just simply answer your questions.

As you may know, I charge $30/hour
But via Chat Now I charge $20/hour
min. of 1 hour charge.

Don't worry, you won't be charge for connecting or talking to me.

Click Here to Chat Now

Sunday, October 01, 2006

ChaCha.com

ChaCha.com will become the biggest search engine in the internet.
You get to search with a Guide with more accurate information.

I, myself, am a ChaCha Guide.
You can become one too and get paid for it.
Its a good side job, or to keep you busy when you are online bored with nothing to do. This is all free.
There are four levels, Apprentice, Pro, Master, and Elite.
You start as an Apprentice - no pay (takes about 30 minutes to become Pro)
Pro - you get paid $5/hour
Master - the people you are network, you make 10% commission off of your people
Elite - You get paid $10/hour

If you are interested to become one. Please e-mail to for an invitation

E-mail - BizManFirst@gmail.com
MSN - BizManFirst@hotmail.com
AIM/AOL - BizManFirst or PCSPTHELP

Saturday, August 05, 2006

Photoshop Touch-Up Before & After

I added a new service to the pcspthelp it is PHOTOSHOP TOUCHUP
The fees for regular touchup (includes glamourous and dreamy)
$20 for 1 photo
$35 for 2 photos

If you want to touchup more than 3 photos we can work on a set price.
I also do gaming sigs and wallpaper (the gaming wallpaper I can do replacement of your head/face)
Every now and then I will be posting before and after pics that I worked on on my free-time.
Here are some samples


Photobucket - Video and Image HostingPhotobucket - Video and Image Hosting


Photobucket - Video and Image HostingPhotobucket - Video and Image Hosting

Photobucket - Video and Image Hosting


Photobucket - Video and Image Hosting


Photobucket - Video and Image Hosting

Saturday, February 11, 2006

Linux?

this isn't much of a news
this is more of what I am currently working on
I've built a new PC for playing around with.
I installed Ubuntu (linux)
great to learn how to use

Linux by the way is free. So no need to pay an OS that cost like $189+ like Windows.
Linux has much more things to play with and testing and learning.

Linux have many distros (versions)
definitely check this out http://www.ubuntu.com/
they are the most used linux right now.

its all open-source, so even the SOFTWARES are free.

OpenOffice.org is basically Microsoft Office and you can save files as MS Doc.

Tuesday, January 17, 2006

iPOD dummies???

Unforunately in this world there are people that would pay for something that you can get for free. For example, iPod lessons.

There are people that are paying $100 for 40-60 minutes lesson on how to install iTunes, create playlist, how to delete, and whatever an ipod does.

You can get this service for free @ APPLES.....

Last year a company "Selfridges" set up a SpeedPod service in which CDs are loaded on to the music players for a fee.
Of course it was kids and old people who took them up on that service.

Sunday, December 25, 2005

Merry Christmas and Beware of Santa Claus

With the holidays upon us, the name of Santa Claus is being used for evil rather than good by worm developers, who have targeted major instant-messaging systems with a holiday-themed virus.

The IM.GiftCom.All worm has made an appearance on several messaging networks, including America Online, Microsoft MSN, and Yahoo. The worm attempts to dupe you into believing that a friend has sent you a link to a harmless file. If you click on the file, you see an image of Santa. While viewing it, the worm attempts to install a rootkit on your system. Rootkits are frequently used to circumvent security software and give an attacker remote control of a machine. Once the attacker is inside your system, the worm harvests your instant-message contact lists for subsequent infections.

please be careful
and happy holidays to all