February 18, 2009

TrapCall exposes anonymous cellphone callers

A service launched on Tuesday lets cell phone users unmask the Caller ID on anonymous calls.

 

TrapCall, which is offered by TelTech Systems, reveals the phone numbers of and, in some cases, the names and addresses of blocked Caller IDs. Toms River, N.J.-based TelTech is also the company behind the controversial SpoofCard, an Internet calling-card service that allows users to place calls in which originating caller numbers appear to be something completely different–like the White House switchboard.

Cell phone users have long been able to shield their originating number from display by dialing *67 before placing a call. However, cell calls placed to 800-numbers have been immune to this technique because the toll-free number is paying to receive the call. TrapCall takes advantage of that arrangement.

TrapCall instructs new users to reprogram their cell phones to send all rejected, missed, and unanswered calls to TrapCall’s own number. When a blocked or restricted number appears on a cell display, the user presses a button on the cell that is normally used to send the call to voicemail. The call is then rerouted to TrapCall’s toll-free line, where the caller’s information is obtained and then sent back to the original call’s recipient. All this reportedly takes about six seconds while the caller is listening to a cialis price compare normal dial tone.

The service, which is currently available to AT&T and T-Mobile subscribers, is free and includes the option of blacklisting unwelcome callers. Additional premium features include the recording incoming calls (which TelTech notes may be illegal, depending on the users’ individual state laws), voicemail transcriptions via e-mail and text message, and the ability to listen to voicemail via the Web.

However, the service raises a couple of sticky privacy issues, especially for victims of domestic violence.

Cindy Southworth, director of technology at the National Network to End Domestic Violence, told Wired that the service raises “huge concerns” for her that abusers would use the service to locate victims fleeing abusive relationships, especially ones in which the victim and abuser share custody of a child.

However, TelTech President Meir Cohen responded to those charges by defending the service as merely utilizing a process that has long been available to anyone with access to an 800-number.

Permalink • Print • Comment

February 17, 2009

Why Comcast hates – and fears – the Internet

February 12th, 2009

Posted by Robin Harris

Comcast lost corporate credibility last year over Internet bandwidth management: breaking FCC rules; enraging customers; and packing public meetings with Comcast employees. All that over network management?

Nope. Comcast has a much bigger problem – and it isn’t with Torrent users.

Follow the money
How does Comcast make its money? Selling TV programs – and now HDTV programs – to subscribers. Internet access is a profitable addition for current subscribers, but as a stand alone business it stinks: cable costs are too high to be supported by ISP revenue alone.

But what are Internet users doing? The are using the Internet to download TV shows and movies. Comcast can’t sell you the content as “cable TV” when you can get it for free on the web.

VOIP too
Another fast growing business for Comcast is VOIP. But if you use Skype over your Internet connection you won’t buy Comcast’s VOIP service.

It is a conundrum, indeed. If they increase the bandwidth of their system to enable Internet HD video, they slit their own throats. If they don’t the telcos may steal Internet business with DSL or wireless 3G.

What is Comcast to do?
It looks like they’re moving towards a multi-prong strategy:

  • Meter Internet bandwidth. This is a winner: less investment in bandwidth; a chance to collect overages from heavy downloaders; entry-level pricing low enough to keep DSL and satellite at bay.
  • Push “everything” packages. TV, phone, Internet at a price carefully calculated to be less than the sum of the parts. Grab telco revenue, minimize downloading, lock out ISP competition.
  • Kill “net neutrality.” Comcast wants to charge Internet entertainment suppliers so make up for the people canceling cable TV service. Common carrier status (see “Net Neutrality” is stupid) eliminates this revenue, so Comcast is fighting it.

The Storage Bits take
Cable’s had a good run, but it is coming to an end. TV, which used to be concentrated in 3 networks, is now atomized among dozens competing for screen time with video games, DVDs and computers.

Cable’s costly infrastructure, optimized for hundreds of channels, can’t adjust to a world where entertainment is downloaded. They have to tame the Internet to survive.

The telcos have been going through hard times as land line usage craters. Cable is next up.

Gigabit Ethernet to every home should be a national goal. Let people, not companies, decide what cialis prescriptions they want to see. Let entrepreneurs build new services to use that bandwidth and see what happens. It will be cool.

Comments welcome, of course. I’m their worst nightmare: no cable; no landline; just a wireless ISP and a cell phone. I don’t miss either.

Permalink • Print • Comment

Focus Lock

A reader asks: "I have a problem with my digital camera. When I shoot an off-center subject, the camera focuses on the wall behind them. How can I make the camera focus on what I want?"

Many digital cameras focus on whatever is in the very center of the viewfinder or LCD screen. So, if your subject isn't there, the stuff behind (or in front) of them will be nice and sharp, but it won't.

One time to really watch out for this is when you're photographing two people cialis prescription online standing side by side. You have a person on each side of the viewfinder, but the sensor is busy focusing on the wall behind them.

For example, take this photo of two chairs I just shot in the basement (sorry, I was the only one around, so I couldn't get any actual people to pose):

In this close up, you can see how the camera focused on the wall behind them (gasp!):

Ah, but not to worry. There's an easy way around this little problem!

Most digital cameras have a feature called "focus lock." The vast majority of these activate when you press the shutter release half way down and hold it there. Usually, there's some sort of light to indicate you have sharp focus (and this light is usually located next to the viewfinder and glows green when the image is properly focused).

So, all you do, again with most cameras, is move the camera so your subject is temporarily centered, press part way down on the shutter release to lock in the focus, hold the button in position as you recompose and finally, press the shutter release the rest of the way down.

In this instance, I just centered one of the chairs, held the focus lock, moved the camera back to the composition I wanted and shot.

Note that if you let up on the shutter release at any point in this procedure, you'll lose the focus lock and have to start over.

As always, consult your owner's manual for specifics, but this is one procedure that seems universal for most digital cameras. Happy shooting!

Permalink • Print • Comment

February 16, 2009

How do I … block IP addresses with Peer Guardian 2?

  • Date: October 22nd, 2008
  • Author: Jack Wallen

Network security doesn’t end with the installation of a firewall or any automated security package. There are times when you’ll need to block certain ranges of IP addresses (or known hosts) based on a service and/or block specific IP addresses from gaining access to your network cialis plus (or machine). Peer Guardian 2 makes this task simple in a Windows (currently 98/ME/2000/XP) environment. The application is open source, so you can download the source code, modify it, and even create your own branch of the software.

This little gem of a software package makes blocking IP addresses very simple. But in its simplicity, Peer Guardian 2 does not lose either functionality or robustness. I’ll explain how to create lists of IP addresses to block in Peer Guardian 2, but first let’s get the software installed and up and running.

This blog post is also available in PDF format in a TechRepublic download.

Getting and installing

As with most all Windows software, installation of Peer Guardian 2 is a snap. Simply download the OS-specific binary from the Phoenix Labs download site and double-click the installation file. The standard installation steps will take place and, once the application is installed, you will be asked to walk through some initial setup configurations.

The first part of the setup will ask what types of lists to install. There are six types of lists as well as an option for always allowing HTTP requests. The options are shown in Figure A.

Figure A

Don’t worry if you select something wrong, you can always edit your lists manually.

The next phase in the setup is to configure updates. The setup system wants to know whether it is to update lists and/or software and how often these updates are to occur. Figure B illustrates the configuration options for automatic updates.

Figure B

Unless you plan on manually updating Peer Guardian 2, make sure you select to have it updated automatically along with the lists.

Once you have completed the updates section, you are finished with the configuration. After the configuration is complete, you will be greeted with a small window (Figure C) that shows the progress of the updates.

Figure C

Even if you’ve configured updates to occur automatically, you can check for them manually from the main window.

Once the updates are finished, click the Close button and you are ready to run Peer Guardian 2.

Fire it up

Go to your Start menu and look for the new entry for Peer Guardian 2. Within that menu you will find the entry to start system. When Peer Guardian 2 starts up, you will see the main window, shown in Figure D.

Figure D

Take a look at the number of blocked IP addresses: 774,193,650!

Now what we want to do is open up the List Manager. This is where blocked IP addresses are listed. From within the List Manager (Figure E) you can enable lists, edit lists, create lists, open lists, and remove lists.

Figure E

The lists shown are the default lists created when Peer Guardian 2 is initially set up.

Creating a new list

Click the Create List button. This will open a new window (Figure F) where the initial information for the list will be set up.

Figure F

This window sets up the type of list, the description, and the file name.

At first it seems a file has to exist in order to create the list. This is not so. When you click the Browse button in Peer Guardian 2, a Save As window will appear. Locate the folder where the file is to be stored and give the file a name. That’s it. Once the new list is saved, the list editing tool will open (Figure G).

Figure G

Once your list gets large enough, you might have to use the Search function to locate a specific IP address.

Click the Add button and a new text area will appear. This first text area is really just for a description of the IP range. Here’s an example: On an inside network there is a specific database server that houses all of the company’s private Human Resource data. This data is off limits to a large range of employees (IP addresses 192.168.1.100 – 192.168.1.200). To block those IP addresses from gaining access to this particular machine, you could set up a range, as shown in Figure H.

Figure H

Once you enter the description, hit Enter to move to the starting IP address and then hit Enter again to move to the ending IP address.

If that is the only range that is necessary to block, click Save and the list will appear in the List Manager.

Temporarily allowing lists

Going back to the Employee example, let’s say it is necessary to allow that range of employees access to the server for a short window of time. To do this, open up the List Manager, highlight the list containing the Employees range, and click Open List. Now highlight the entry containing the range of IP addresses to be allowed and right-click the entry. A drop-down list will appear, giving you four possible choices (Figure I).

Figure I

Unfortunately these options cannot be modified without going into the code (but since this is open source, it is possible).

From the drop-down list, select the option that best suits the situation and click Save. Depending on the system, there might be a brief stall on the machine as Peer Guardian 2 makes the necessary changes to allow the range of IP addresses. At this point a List Cache might be created, which will take a moment (again depending on the speed of the system).

Logs, history, and other features

Another nice feature of Peer Guardian 2 is the log file viewer. The log file actually keeps a running log that is retained by date. And until the history is cleared, all logs are retained. This is a great help when security audits are done.

From the Settings tab you can configure a few settings for Logs, History, and Notification. As you can see in Figure J, configuration is very straightforward.

Figure J

By changing the Log Allowed Connections to Archive and Remove, the Archive To option becomes available.

Click the Next button and the Settings tab will change to offer another group of straightforward configuration options (Figure K).

Figure K

The proxy setting is for when a proxy is needed to download updates.

Another nice Peer Guardian 2 touch is that with a single button on the main screen you can disable it. And with the same ease, Peer Guardian 2 can also be re-enabled. In addition, HTTP can be allowed or blocked with the click of a button.

Final thoughts

Peer Guardian 2 is an outstanding tool to add to your security arsenal. Not only is it good for network-wide security, it’s great for single server (or even desktop) security. Peer Guardian 2 is simple to set up, but its power is not diminished by that simplicity.

Permalink • Print • Comment

February 15, 2009

Faster, Safer Surfing with OpenDNS

Techtip 205

Faster, Safer Surfing with OpenDNS

By Scott Nesbitt – Sunday, February 15, 2009

PullQuote205cialis pills width=”255″ height=”121″ align=”left” />Even with a high-speed Internet connection, you might find that getting to certain Web sites takes a lot longer than you want it to. There are a lot of reasons for this, but one of the bottlenecks is the DNS server that your Internet service provider runs.

You can get around this bottleneck, though, by using a Web-based service called OpenDNS.

DNS: A little background

DNS is short for Domain Name System. Among other functions (which you can read about here), DNS converts the names of domains from a string of numbers – for example, an IP address like 68.177.52.6 – to something a human can read, like www.geeks.com.

Internet service providers run DNS servers (also called name servers, which assigns a human-readable domain name to the string of numbers that represents an address on the Internet. When you type the URL of a Web site into your browser, an inquiry is sent to the DNS server and based on the information that's stored on that server, you're directed to the site in question.

While using your Internet service provider's DNS server is fine, you have to remember that everyone else who subscribes to that provider will be hitting the same server (or set of servers). That slows your surfing down.

OpenDNSEnter OpenDNS

OpenDNS maintains a network of DNS servers, which are distributed in various locations, including New York, Chicago, Seattle, and London. Your request to the OpenDNS servers are routed to the server nearest you. That generally means you don't have to wait as long as you would with your Internet server provider's often busy DNS server.

On top of that, OpenDNS has options for different kinds of networks – home, school, small or medium business, or larger companies. The basic features – like phishing protection and content filters – are the same, but there are also features specific to each kind of network. Like what? For example, a school using OpenDNS has the option to counter anonymizers, while a small business can take advantage of a reliable network that supposedly has no network downtime.

Setting up

Setting up OpenDNS is fairly simple. If you're a home user (which this TechTip is going to focus on), you can set OpenDNS for a desktop computer or a laptop computer, or a router.
The process involves three step:

  1. Changing the DNS settings on your computer or on your router
  2. Create an account with OpenDNS (this step is free)
  3. Tweak your settings at the OpenDNS Web site

How you change the DNS settings on your computer varies by the operating system that you're using. You can get the instructions for the operating system that OpenDNS supports here. And, as you probably guessed, the instructions also vary by the brand of router that you're using. If your router isn't in the list, there are generic instructions that you can try.

Other useful features

Once you've changed the DNS settings for your computer or router, you can take advantage of some of the useful features that OpenDNS offers by logging into your OpenDNS account and clicking Settings.
What settings are you likely to tweak? The one that you'll probably use most is content filtering. This enables you to block access to over 50 different types of content – ranging from adult Web sites to phishing and adware sites to ones that promote hate and discrimination. OpenDNS offers four preset filtering levels, ranging from high (blocks access to all seamy sites) to minimal (only protects against phishing attacks). You can also opt to pick and choose the filtering options that you want.

You can also block or allow access to specific Web sites which may not fall into any of the content filtering categories.

On the Settings page, you can click Advanced Settings to take advantage of some of the more interesting features of OpenDNS. Two that I've found useful are enabling network shortcuts and typo correction.

Network shortcuts enables you to assign a short name to a Web site. For example, you can configure the shortcut gc to take you to www.geeks.com. Once you set up the shortcut, all you have to do is type the shortcut in your Web browser's address bar.

Typo correction fixes any URLs that you may incorrectly type. For example, if you type geeks.cmo or geeks.ocm OpenDNS will automatically change the URL to geeks.com. However, sometimes this doesn't work and can be a bit of an annoyance as I'll discuss in a moment.

Drawbacks of OpenDNS

There are a few. Most of those drawbacks are minor, and here are the main ones.

As with any Web-based application, you're at the mercy of the application itself. While OpenDNS has impressive uptime, there's always a chance that the service could go down for an extended period of time.

Remember when I talked about the typo correction? Let's say you really butcher a URL – say, www.geeeks. instead of www.geeks.com. OpenDNS does something that many Internet service providers do. It redirects you to a search page, which may or may not have relevant results. On top of that, there are ads on the search page which not everyone appreciates.

After using OpenDNS for a while, you might find that some or all of the sites that you frequent don't load as fast as they did when you started using the service. This is because your computer saves DNS information in a cache. It uses the cached information whenever you try to hit one of those sites. The easy way around this is to clear your computer's DNS cache. How?

To do that, open a command prompt. In Windows, type the command ipconfig /flushdns and press Enter. In MacOS 10.5, type dscacheutil -flushcache and press Enter. In Linux, /etc/rc.d/init.d/nscd restart (you may have to do this as root).

Conclusion

OpenDNS is an interesting and potentially very useful service, especially if you want faster, smoother access to your favorite Web sites. You might not always get a huge increase in speed, but in many cases you'll notice a difference.

Best of all, it's easy to set up, well documented (the knowledgebase at the OpenDNS site is quite good), and it's free. Your best bet is to give OpenDNS a try. You'll probably find that it makes your surfing a lot faster and safer.

Permalink • Print • Comment
« Previous PageNext Page »
Made with WordPress and the Semiologic theme and CMS • Sky Gold skin by Denis de Bernardy