The CurrCon Java Applet displays prices on this
web page converted with today’s exchange rates into your local international currency,
e.g. Euros, US dollars, Canadian dollars, British Pounds, Indian Rupees…
CurrCon requires an up-to-date browser
and Java version 1.7 or later, preferably 1.8.0_25.
If you can’t see the prices in your local currency,
Troubleshoot. Use Chrome for best results.
A computer that examines traffic coming and going to the Internet, and dynamically
filters out messages from certain IP (Internet Protocol)
addresses. It can prevent people inside from hooking up to various outside computers
and vice versa. The firewall rules allow you to specify which applications and
services can send or receive packets via TCP (Transmission Control Protocol)
UDP (User Datagram Protocol)
protocols. Usually all UDP protocols such as NNTP (Network News Transfer Protocol)
are blocked, since you tend to burst security wide open if you open it up a little
Often a firewall is implemented with Linux. Using two separate operating systems
tends to make life more difficult for the vandals. The most secure sort of firewall
is a dedicted router box that is incapable of running any programs other than the
firewall firmware. These are now under
They are simple to install, but lack the flexibility of a Linux-based firewall.
Hardware firewalls are good at keeping the outside world out. Software firewalls are
good at preventing trojans running on your machine from accessing the net and
There are four schemes for tunneling through firewalls NAT (Network Address Translation),
SPI (Service Provider Interface),
SOCKS (Sockets) and
explicit proxy servers.
I am not too clear on this, but there appear to be several configuring protocols
UPnP-NAT(PC (Personal Computer)), NAT-PMP(Mac)
and SOHO. And many routers are not configurable.
If you have a server on your LAN (Local Area Network) that provides some
protocol, you must configure your firewall to let traffic on the socket ports it use
in and out. Further, you must arrange that incoming requests to open a socket are
redirected to the appropriate computer on the LAN.
Typically you configure your firewall router using a browser to talk to the fixed
IP of the router e.g.
http://192.168.0.1/:80, and talk to
GUI (Graphic User Interface) in the router’s firmware. You most commonly
would specially configure your firewall if you were:
hosting a static HTTP (Hypertext Transfer Protocol) server