How to Track Website

Document Sample
How to Track Website Powered By Docstoc
Section 1:-
       Company Profile
       History
       Mission & Objectives
       Certifications
       Sites and Tools Used
Section 2:-

       What is Website Analytics?
       What is Website IP Address Look-up?
       How to track a geographical location of website?
       Tips to save your personal information.
Section 3:-
There are some examples of Implemented website tracking.
   Google Analytics


With great sense of gratitude and pleasure I offer my sincere
thanks to Mr. Arshdeep Singh, (Director, Tarwinz Niche
Technologies Vision, Mohali,) and my Project Guide Mr.
Rakesh Ranjan,    for his valuable suggestions, guidance &
encouragement towards the completion of this Project.

I also acknowledge the support & guidance of all the Teaching
Faculty for helping me to overcome the various bottlenecks
encountered by me during the course of this project.

This acknowledgement would be incomplete without thanking
my friends & colleagues who helped me directly or indirectly in
the completion of this project.

    Company Profile:-


Appin Knowledge Solution is a part of Appin Group of Companies and the
premier provider of hi-technology certification, courseware as well online,
computer based and instructor led training across the world. Appin is primarily
an IT Alumni Company. Appin has come with a way of innovative learning
concept using Computer Based Training Software (CBTS) in a highly interactive

Appin School of Niche Technology is an innovative concept of imparting hi-
technology training to customers and young professionals in niche areas
including Information Security & Ethical Hacking, Embedded Systems, Robotics,
Application Programming, Nanotechnology, Networking & Communication and
other emerging technologies.


Our mission is to provide current and comprehensive educational
programs that enhance individual performance and corporate
productivity in hi- end technology with a knowledge based.

We provide the most convenient and cost effective delivery of
course content created by world experts in academia and industry.

Appin School of Niche Technology is venture of IIT Alumni to cater
the need of industry ready professionals.

Appin is dedicated to provide Niche and highly qualified technologies
which are value-based and operates at a highly technical education
sector. It has dedicated itself to the training and development of
outstanding professionals in order to meet the ever-growing
challenges of technology industry.


Internationally Certified by –

         o Mr Ashok Sapra – Has worked as President and MD with AT&T
           South Asia and as CEO GE, Communications.

         o Dr. Dheeraj Bhardwaj – Featured as to 50 youth on fast track by
           India Today, who has worked as professor at IIT Delhi and as
           Director with Sun Asia Pacific Science & Technology Center, Sun
           Microsystems Inc.

         o Mr A.S Chandrasekhar – worked as Director with the Bureau of
           Indian Standards and Confederation of Indian Industries.

     o   Mr Rajat Khare – A sensational young entrepreneur from I.I.T Delhi,
         I.I.M-(A) and co-founder of Appin and presently christined as Guru if
         IT Security and Ethical Hacking In India.

     Rated among the top 5 professional courses offered in India (The Week
     Appreciated by the former President of India Dr. APJ Abdul Kalam at The
      Rashtrapati Bhawan for our entrepreneurial spirit and our flagship
      product Information Security and Nanotechnology.
     Symantec (Norton Anti-virus) Registered Partner.
     First in the world to launch CBTS certification courses in Information
      Security, Embedded Systems, Robotics and Nanotechnology.
     First to author books on IT security, Robotics, Nanotechnology along
      with BPB publications in India.
     Reached over 70,000 customers via training programs and products.
     Training Programs and products sold in over 71 countries.
     Network of over 75+ premium hi-tech learning centers in South Asia.
     Approved by the International Association of Distance Learning (IADL),


Tools used in the Project

     Platform: Windows 7 Ultimate
     NeoTrace
     GeoSpider

What is Website Analytics?

Web analytics is the measurement, collection, analysis and reporting
of internet data for purposes of understanding and optimizing web
Web analytics is not just a tool for measuring website traffic but can
be used as a tool for business research and market research. Web
analytics applications can also help companies measure the results of
traditional print advertising campaigns. It helps one to estimate how
the traffic to the website changed after the launch of a new
advertising campaign. Web analytics provides data on the number of
visitors, page views, etc. to gauge the traffic and popularity trends
which helps doing the market research.
There are two categories of web analytics; off-site and on-site web
Off-site web analytics refers to web measurement and analysis
regardless of whether you own or maintain a website. It includes the
measurement of a website's potential audience (opportunity), share
of voice (visibility), and buzz (comments) that is happening on the
Internet as a whole.
On-site web analytics measure a visitor's journey once on your
website. This includes its drivers and conversions; for example,
which landing pages encourage people to make a purchase. On-site
web analytics measures the performance of your website in a
commercial context. This data is typically compared against key
performance indicators for performance, and used to improve a web
site or marketing campaign's audience response.
Historically, web analytics has referred to on-site visitor
measurement. However in recent years this has blurred, mainly
because vendors are producing tools that span both categories.

On-Site Web Analytics Technologies
Many different vendors provide on-site web
analytics software and services. There are two main technological
approaches to collecting the data. The first method, log file analysis,
reads the log files in which the web server records all its transactions.
The second method, page tagging, uses JavaScript on each page to
notify a third-party server when a page is rendered by a web
browser. Both collect data that can be processed to produce web
traffic reports.
In addition other data sources may also be added to augment the
data. For example; e-mail response rates, direct mail campaign data,
sales and lead information, user performance data such as click heat
mapping, or other custom metrics as needed.

Web server log file analysis
Web servers record some of their transactions in a log file. It was
soon realized that these logfiles could be read by a program to
provide data on the popularity of the website. Thus arose web log
analysis software.
In the early 1990s, web site statistics consisted primarily of counting
the number of client requests (or hits) made to the web server. This
was a reasonable method initially, since each web site often
consisted of a single HTML file. However, with the introduction of
images in HTML, and web sites that spanned multiple HTML files, this
count became less useful. The first true commercial Log Analyzer was
released by IPRO in 1994.
Two units of measure were introduced in the mid 1990s to gauge
more accurately the amount of human activity on web servers. These
were page views and visits (or sessions). A page view was defined as
a request made to the web server for a page, as opposed to a
graphic, while a visit was defined as a sequence of requests from a
uniquely identified client that expired after a certain amount of
inactivity, usually 30 minutes. The page views and visits are still

commonly displayed metrics, but are now considered rather
The emergence of search engine spiders and robots in the late
1990s, along with web proxies and dynamically assigned IP
addresses for large companies and ISPs, made it more difficult to
identify unique human visitors to a website. Log analyzers responded
by tracking visits by cookies, and by ignoring requests from known
The extensive use of web caches also presented a problem for logfile
analysis. If a person revisits a page, the second request will often be
retrieved from the browser's cache, and so no request will be
received by the web server. This means that the person's path
through the site is lost. Caching can be defeated by configuring the
web server, but this can result in degraded performance for the
visitor to the website.

Page tagging
Concerns about the accuracy of logfile analysis in the presence of
caching, and the desire to be able to perform web analytics as an
outsourced service, led to the second data collection method, page
tagging or 'Web bugs'.
In the mid 1990s, Web counters were commonly seen — these were
images included in a web page that showed the number of times the
image had been requested, which was an estimate of the number of
visits to that page. In the late 1990s this concept evolved to include a
small invisible image instead of a visible one, and, by using
JavaScript, to pass along with the image request certain information
about the page and the visitor. This information can then be
processed remotely by a web analytics company, and extensive
statistics generated.
The web analytics service also manages the process of assigning a
cookie to the user, which can uniquely identify them during their visit
and in subsequent visits. Cookie acceptance rates vary significantly
between web sites and may affect the quality of data collected and
Collecting web site data using a third-party data collection server (or
even an in-house data collection server) requires an
additional DNS look-up by the user's computer to determine the IP
address of the collection server. On occasion, delays in completing a
successful or failed DNS look-ups may result in data not being
With the increasing popularity of Ajax-based solutions, an alternative
to the use of an invisible image, is to implement a call back to the
server from the rendered page. In this case, when the page is
rendered on the web browser, a piece of Ajax code would call back
to the server and pass information about the client that can then be
aggregated by a web analytics company. This is in some ways flawed
by browser restrictions on the servers which can be contacted
with XmlHttpRequest objects.

Visitors Geolocation
With IP geolocation, it is possible to track visitors location. Using IP
geolocation database or API, visitors can be geolocated to city,
region or country level.
IP Intelligence, or Internet Protocol (IP) Intelligence, is a technology
that maps the Internet and catalogues IP addresses by parameters
such as geographic location (country, region, state, city and
postcode), connection type, Internet Service Provider (ISP), proxy
information, and more. The first generation of IP Intelligence was
referred to as geotargeting or geolocation technology. This
information is used by businesses for online audience segmentation
in applications such online advertising, behavioral targeting, content
localization (or website localization), digital rights
management, personalization, online fraud detection, geographic

rights management, localized search, enhanced analytics, global
traffic management, and content distribution.

Click analytics
Click analytics is a special type of web analytics that gives special
attention to clicks (Point-and-click).
Commonly, click analytics focuses on on-site analytics. An editor of a
web site uses click analytics to determine the performance of his or
her particular site, with regards to where the users of the site are
Also, click analytics may happen real-time or "unreal"-time,
depending on the type of information sought. Typically, front-page
editors on high-traffic news media sites will want to monitor their
pages in real-time, to optimize the content. Editors, designers or
other types of stakeholders may analyze clicks on a wider time frame
to aid them assess performance of writers, design elements or
advertisements etc.
Data about clicks may be gathered in at least two ways. Ideally, a
click is "logged" when it occurs, and this method requires some
functionality that picks up relevant information when the event
occurs. Alternatively, one may institute the assumption that a page
view is a result of a click, and therefore log a simulated click that lead
to that page view.

What is Website IP Address Look-up?
The IP Address Lookup tool also referred to as IP Lookup, Lookup IP,
Lookup IP Address, IP Address Location, IP Location, and IP Locator is
designed to give you an idea of where your IP Address or the IP
Address you lookup is located. This tool is not 100% accurate due to
many different factors. Some of those factors include where the
owner of the IP has it registered, where the agency that controls the
IP is located, proxies, cellular IPs, etc. If you are in the US and the
controlling agency of the IP is located in Canada, chances are the IP
address lookup results will show as Canada. Showing a Canadian IP
while in the US is very common among Blackberry users on the
Verizon network.
The results of this IP Address Lookup utility include the IP Address,
City, Host Name, Region / State, Postal / Zip Code, Country Name,
Country Code, Time Zone, Longitude, Latitude, ISP, Domain Name,
Net Speed, and IP Decimal.
Often, people think if they perform and IP address lookup, that they
are going to find the physical mailing address of the user assigned
the IP in question. This is simply not true. At this time, we are not
aware of any IP address database that will give you the exact physical
postal address of the IP address you lookup. At best, you'll get the
exact city in which the user of the IP is located. For an exact physical
address you would need to contact the ISP (Internet Service
Provider) of the IP address in question. However, without a police
warrant, or some sort of legal document forcing the ISP to turn over
the information, don't expect them to give you the mailing address
of the user that was assigned the IP at the time you received the
offensive email, or other means of offensive / questionable
communication from said IP. The best you can do in this case is to file
a complaint with the ISP and forward them all of the information
from the questionable / offensive communication regarding the
complaint. If you have any questions about the IP Address Lookup
tool or the results, please check out our IP Address Lookup Forum.

IP Address WHOIS Lookup
The IP WHOIS Lookup tool will provide you with the IP
Address owners information. The IP Whois information contains data
such as who allocates the IP (ie. ARIN, APNIC, RIPE, etc.), if the IP
Address is allocated, IP Address contact information, and more. The
results will also show other important information like how many IP
Addresses are in the block or blocks assigned to the owner of the IP
you're referencing.
If you have any questions about the IP Address WHOIS Lookup tool
or the results, please check out the IP Address WHOIS Lookup Forum.

IP Address Host Name Lookup
This Host Name Lookup tool often referred to as hostname lookup
does exactly what it looks up the Host Name of the IP
Address you enter. A simple, yet very effective tool for getting the
host name information you need.

User Agent String
                          User Agent String
User Agent

          Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US)
     AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215

Screen Resolution

               Your Screen Resolution is: 1360×768

This page displays your User Agent String and Screen Resolution.
This is a very basic output of the User Agent also referred to as
simply UA. Your User Agent tells every site your visit what browser
you're using. Sites are able to detect your UA and redirect to a more
fitting page for your browser if desired. In other words, if you go to a
site with this detection in place from a mobile phone the site might
detect you are a mobile user via the UA and redirect you to their
mobile site if available. This doesn't work on all sites becuase not all
sites have UA detection in place.

UAs also tell the sites you're visiting some browser related software
which you may have installed. For example, this UA (Mozilla/4.0
(compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; GTB6;
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) ; SLCC1;
.NET CLR 2.0.50727; Media Center PC 5.0; InfoPath.2; .NET CLR
3.5.21022; .NET CLR 1.1.4322; .NET CLR 3.5.30729;
OfficeLiveConnector.1.3; OfficeLivePatch.0.0;) tells us that the visitor
is using Internet Explorer 8, Windows Vista, has Media Center PC 5.0
installed, Office Live Connector, etc. So if we had a special section for
Vista users, we could redirect this person based on the Windows NT
6.0 string to a sub section in our site related strictly to Vista.
This User Agent on the other hand, Mozilla/5.0 (Windows; U;
Windows NT 6.0; en-US; rv: Gecko/20090824 Firefox/3.5.3
tells us the visitor is using FireFox 3.5.3 and Windows Vista. Not
much else.
Having the knowledge from above, User Agent Spoofing is used by
many programmers that don't want people to know how they're
getting to the site(s). Some programmers will find legitimate UAs and
program their script to use such UAs. UAs can be blank, or contain
custom information like a URL to a site that might promote a
particular browser or script.

Tracking a geographical location of website
 Software Used: Neo Trace Pro
     1. Tracking geographical location of website

     Network Information

     Registrant Info

Tracking a geographical location of
Software Used: Geospider

What is GEO Spider?
 GEO Spider helps you to detect, identify and monitor your network activity on world map.
 You can see website, IP address location on the Earth. Unlike other programs GEO Spider
 can trace a hacker, investigate a website, trace a domain name.

 Built on .NET technology GEO Spider uses fast approach in detecting hostnames, IP
 addresses, domain names.

 Now you can trace your network connections on world map.

 While many IP lookup tools only provide network provider locations, GEO Spider uses
 unique IP location engine to provide a much higher level of accuracy by identifying the
 actual physical city and country location of servers and routers.

 GEO Spider can analyze and trace all network applications on fly, including

 GEO Spider main features:

        GEO Spider Spy Engine
        Draw Map on Desktop
        Skip Local Network (192.168.x.x,, 10.x.x.x, etc)
        Catch all connections
        Remove idle connections
        Make screenshots
        Lookup IP on map
        Lookup website on map
        Trace Routers to IP or website
        Ping particular hostnames
        Customizable alerts
        Export/Import Alerts
        Export/Import IP List
        Export/Import Connections
        Adjustable Map
        Customizable Zoom
        User friendly interface

 What is this all designed for?
 GEO Spider helps you to detect, identify and monitor your network connections on world
 map. You can trace any website, IP address on your map. Unlike other programs GEO
 Spider can trace a hacker, investigate a website, lookup a domain name.

 With GEO Spider you can:

        Check the domain names
        Detect fraudulent sites
        Detect network problems
        Lookup WhoIs information about the site and IP address
        If your website became unavailable you can be alerted shortly by:
         - launched application
         - played media file
         - received email
        Catch all connections and see its on the world map
        Export whois reports to:
          - Text file
          - Microsoft Word file
          - HTML file
          Export connections for future usage
        Import connections to make ping, etc.

 Website Tracking
 1. Tracking of Website:

 Vizzmania Whois, Domain Info

 Whois IP of

 Trace Route of Vizzmania

2. Tracking of Website:

     Google Whois, Domain

     Google Whois IP

Trace Route of

3. Tracking of

Appin Whois, Domain

     Appin Whois

TraceRoute of

     Some examples of Implemented website tracking
        What is is an advanced and truly private web based website
         visitor counting, geo tracking and traffic analytics / statistics service
         built on a proprietary technology developed by a private computer
         laboratory based in Massachusetts, USA. is a spam
         free service.
 provides its users with answers to the following
         • Who visits my website?
         • Is my business profitable for the website traffic it receives?
         • How many people are on my website right now?
         • Is my website popular?
         • How do people find my website?
         • How much time do my website visitors spend reading my web
         • How many visitors do I get within one or several days?
         • How successful is my online business?
         • Is my web advertising successful?
         • Is my website working?
         • Who views my myspace profile and blog?
         • Is my website secure?
         • How many visitors IPs did I block?
         ... and many others.

         Some of the exciting website analytics and visitor tracking features
         that offers are:

         • Visitor phone Caller-ID like detection implementation, only instead
         of a visitor phone number, visitor's IP address is detected along with
         Geographical location and website browsing path.
         • Count website visitors and track the pages people have viewed with
         significantly greater detail than any other service
         • Track and search returning visitors and privately monitor people's
         website browsing activity in in real time
         • Trace the computer's physical location and system statistics of each

             individual website visitor based on the visitor's IP address
             • Control access to your documents and pages via Link Tracker. Block
             or allow access to your content using IP, GEO and Time Filters
             • Access visitor location regional maps for fast website traffic
             • Detect and keep track of the keywords used in the search engines to
             find your website(s)
             • Analyze the most popular pages, internal referrers, external
             referrers and other sources of web traffic
             • Access advanced search engines' lead website analytics
             • Search people's IP address in detailed logs for detailed activity
             • Use a full featured address book to attach IPs to your contact entries
             for quick visitor identification on your traffic logs
             • Create reports of detailed hourly, daily, monthly and yearly website
             traffic statistics

                 Your IP address is:
                                      • Track Your Website Visitors' IP In Real Time

         Overwhelmed with spam? Protect your contact forms

         ISP :   NIB (National Internet Backbone)

   Country :            India

       State :   Punjab

   Hub City :    Patiala
                 (Routed Internet Connection)

 Timezone :      Asia/Calcutta

   Browser :         Chrome 8.0.552.215

         OS :        Windows 7

Screen Res. :    1360x768

      is designed for low, medium and high traffic websites
         such as personal, commercial and non-profit websites, blogs, forums
         and professional establishments, including full support for secure
         computer SSL tracking of the eCommerce web stores.

     1. How does compare to other website statistics systems
        such as Google Analytics, Webalizer Stats & AWstats for example?
 is much different and offers features not available
         anywhere else. Try it out!

     2. Does affect the bandwidth usage with my web hosting

         Just like a "green car" technology approved by the US Environmental
         Protection Agency's, does not substantially increase
         the bandwidth usage of your web hosting provider since the actual
         website statistics analysis software and computer data storage is
         hosted on dedicated servers. Therefore the entire web
         traffic analysis is performed by the CPU power available within computer infrastructure. Furthermore, by utilizing and disabling your own dedicated server's built in
         statistics software, such as the webalizer or cpanel's awstats statistics
         software, it is possible to save bandwidth and CPU processing
         resources, thus speeding up the web page loading.

     3. Would code trigger anti-spam and antivirus security or
        privacy alerts on my webite visitors' computers?
 is strictly a website visitor IP tracker software which
         does not utilize any malicious code base that may trigger online
         security or privacy alerts anti-spam or antivirus software. Anti-spam
         and antivirus software looks for certain virus or malicious digital code
         signatures and patterns and intercepts them before they're
         downloaded onto end-user's computer hard drive or placed in the
         dedicated space range of the random access memory.

        does not contain such code patterns, therefore the anti-spam and
        antivirus security alerts are not triggered.

     4. What is an IP?

     An IP is an abbreviation of Internet Protocol. IP serves a role of a digital
     computer identification number that is assigned by a network it's
     connected to. Without an IP address networking and IP tracking would
     not be possible.

     5. Why does a computer's IP address change from time to time?

        Every time people establish a new connection with their Internet
        Service Provider account either using a wired home / business
        connection or a wireless connection, the ISP's network assigns an
        individual IP number to your computer in order to provide you with
        the data your computer requests from web servers. This is not
        associated with an account privacy matters but rather a technical
        aspect of user account digital id distribution.

     6. What about people's privacy when it comes to using Internet?

        When people connect to their ISP's network using a desktop

        computer, mobile sattelite phone or mobile cellular phone or an
        Internet appliance, their IP's physical location is associated with an
        account owner's financial information digitally stored on a server used
        to issue the service bills, thus making it possible for authorities to
        easily trace their legal physical location. Furthermore, even without
        having a legal warrant to request an owner's account address
        information from an ISP, using tools like, it's possible
        for virtually anyone to approximate their IP's physical location. website analytics and visitor's computer tracking
        functionality does just that.

     7. Who can see and track my IP address?

        When you send emails, post on web forums, use instant messengers
        or access any online accounts - your computer's IP is logged by the
        network receiving communication requests. This is an essential step
        that cannot be avoided and contributes to various technical, security
        and privacy aspects.

     8. Which digital computer devices utilize an IP address and can be
        detected by ?

        Any digital computer device that has a capability to connect to world
        wide web. These IP devices include but not limited to mobile cellular
        phones such as iphone, iphone 3G, iphone 3S, iPad and all iPad
        revisions, Motorola Moto Q, Nexus One Android, Blackberry, Nokia,
        HTC, certain Verizon LG mobile cellular internet phones, Google
        Nexus, Sprint Internet phones, AT&T smartphones, Nokia
        smartphones, latest Palm-One Treo mobile phones, T-Mobile
        smartphones, Samsung and Sony smartphones, iphone clones, digital
        WiFi appliances, laptops with WiFi connectivity and virtually all
        desktop computers.' IP tracker feature allows tracking
        the mobile cell phone devices and serving the captured data via an
        easy to understand interface.

        However, the mobile devices that utilize an IP address identification
        are not limited to the phone and laptop applications. The new GPS
        navigation (global positioning systems) and Vehicle tracking systems
        are the new era of the Internet connected devices. From ordinary cars
        that utilize GPS voice guidance to automated train GPS systems
       feedback devices to Airplane GPS autopilot navigation. Whether
       connected via a proprietary protocols or internal networks - all of
       them are identified by a unique IP address. As the network
       deployment emerges, all devices - from personal computers to
       autopilot GPS navigation systems eventually become a part of the
       same global network.

     9. What can be done to protect my IP's security and privacy?

       It is possible to hide an IP address by using a private Proxy server. This
       helps to conceal your private IP information to a certain extent.

     10.     What is a Proxy Server?

       A Proxy server is a network service which utilizes a dedicated
       computer on a remote network allowing internet users such as
       yourself to make indirect connections to other computers / websites
       using its own network connection. When using a proxy server, the
       recipient of your communications will see an IP address of the proxy
       server and not yours. There are plenty of proxy servers
       establishments on the world wide web that offer free online user
       accounts to hide your online identity. This, however, is not a bullet-
       proof method.

     11.     Is there a risk using a Proxy Server?

       (!) Definitely. Using an anonymous proxy server computer to hide
       your IP actually presents a more serious threat that contributes to the
       digital information leak. Since the digital data has to pass through a
       proxy server, any information you transmit through that server can be
       intercepted and searched, including your account login and password
       information that you may utilize for any of the online services. In
       attempt to search a better privacy on Internet, people search and find
       the tools like the proxy servers, not realizing that the danger is
       actually greater using the proxy servers. Furthermore, in order to
       trace people's illegal activity, some governments setup the proxy
       servers to monitor activity of those people who are most likely to
       have something to hide.

       Never access any of your digitally stored financial account

       information, including online credit card banking systems, initiate
       transfer of funds, pay your bills or mortgages online or register any
       online banking accounts that contain a secure information while using
       a free proxy server. As a matter of fact, most of the electronic identity
       theft cases targeted at financial sectors and being investigated
       worldwide are the direct result of digital information theft via
       utilization of so called free proxy servers that offer free online user

     12.      If someone possesses my private IP information, what type of
        security risk does it present?

       First of all, every single Internet user has an IP number, therefore a
       chance of you becoming a victim of a malicious attack is minimized by
       the overwhelming pool of IP addresses available to those who
       exercise this type of activity. Second of all, to protect your privacy, the
       Internet Service Providers do not release any digitally stored legal or
       financial bank information to anyone but legal authorities. Therefore
       your private information connected to your ISP provider generally
       remains very secure.

       There is still a chance though that you may become a target of an
       internet hacker attack. The IP address attack spoofs your local
       Internet connection by trying to forge your computer's IP via software
       vulnerabilities. If have your computer connected directly to a DSL or
       Cable Modem without a router or a firewall, a hacker may be able to
       access the private data on your computer, especially if you use file
       sharing. In this situation, it would not be a bad idea to get a good
       Firewall software along with an Antivirus software commonly used by
       people such as Antivir or Avast!, or a hardware router with a built in
       digital firewall. There is a definite advantage of having a hardware
       firewall built-in into a router. While a software firewall is good and
       gives you full control, it may be susceptible to viruses,
       misconfigurations and crashes, while a hardware firewall always runs
       in the background, allowing only outgoing traffic, giving you
       somewhat a limited control of your inbound traffic while providing
       you with the best possible protection from a dangerous inbound

Sites Used for Information Gathering



         Submitted by:

         Amandeep singh

         Ramanpal singh

         Sukhmeet singh


Shared By:
Description: Cool tricks For Tracking Websites