วันพฤหัสบดีที่ 20 พฤษภาคม พ.ศ. 2553
PRIVACY IS DEAD - GET OVER IT Pt 34, with Steve Rambam.
http://www.youtube.com/watch?v=AeWBt1JRPtU&hl=en
วันพุธที่ 19 พฤษภาคม พ.ศ. 2553
Computer Security - How to Stay Safe in a World of Hackers
Consider the latest - Die Hard. Some teenagers, few masterminds and trillions of dollars being siphoned off the federal fund that has been deposited against people's social security benefits. Do not think that it is a simple cinematic flick! Today hackers are so sophisticated that they can actually bring a law abiding citizen down on the streets. With the advent of technology making life easier for most of us, getting to shop from the comfort of our homes or transfer money from the safety of our living rooms, the fact remains that the nameless faceless cyber world is dotted with criminal minded people whose sole intention is to rob you off your identity, get access to all your important details and use those for their own benefits. How do you fight that?
Install an anti-virus. An anti-virus protects your computer from malicious viruses that tend to lodge themselves deep into your hard drive and copy all your data and transfer those to servers where you would not want your confidential information to be - a hacker's server. If someone sends you a virus intentionally or unintentionally, the anti-virus detects the virus and destroys it. Keep your anti-virus up-to-date. Set your anti-virus such that there is a weekly scan scheduled for all the hard drives in your computer.
Install a firewall: A firewall will always keep a check on the information that is exchanged between your computer and other computers every time that you are logged on to the internet. That way you will be protected from any unwanted code or application getting downloaded on to your PC inadvertently. Any data that do not meet the security requirement set by the program developer will be barred from entering your computer by the firewall. Always keep your firewall updated as well.
Act Smart:
o Do not store personal information in your computer. Information like your social security number, credit card number, pins, bank account numbers, telephone numbers, addresses, etc.
o Do not click on links that look suspicious. Most spam mails have links that should be avoided. These can lead to downloading of applications that may erase your hard drive.
o Always scan all attachments using your antivirus before opening it or running it or installing it on your computer.
o Do not exchange personal information in chat rooms, through mails or instant messages. Divulge your credit card details or social security details only to secured sources or through secured websites.
o Do not buy pirated products, software or programs. These may send messages over the internet when you are working with the particular software.
o Do not download executable files to your PC from unknown sources. Be extremely cautious while exchanging information over the internet.
Keeping the above points in mind will help you in keeping your computer secure. Although every day a number of Trojan viruses or worms are coded and let loose over the internet, we must always do the best that we can in order to ensure security. A computer is an expensive device. A simple insecure download can render the whole machine useless.
วันอังคารที่ 18 พฤษภาคม พ.ศ. 2553
Safe Password Tips for Better Computer Security
With so many online accounts to manage, most people tend to use the same password for everything. Many also tend to use a very "easy to guess" password. These are two common "password mistakes" that cyber-thieves are looking for. One of the most important things you can do to stay safe online is to ensure your passwords remain private.
Passwords are designed to offer protection, used as the "key" to a door that provides access to some very sensitive personal information. If this information got into the wrong hands, financial loss or identity theft could easily occur. Password theft and identity theft is more common today than ever - due to spyware, Trojans and phishing scams. Once a password has been compromised, an insurmountable amount of personal damage can occur in a matter of minutes. The more accounts your password works with, the greater the damage. For the best security, online account passwords should be different as well as difficult.
Safe Password Tips
Use passwords that are at least eight characters long.
Use a combination of upper and lower case letters, and include at least one number or special character. A "special character" is something like *, &, or -.
Never use your email password for anything other than your email account. Make sure all bank and credit card account passwords are different from each other.
Never use your name, birth date or social security number in a password. Change your passwords from time to time, especially bank account passwords. Never store passwords in a common document file (Excel, Word, Notepad, etc...) that is not protected by encryption.
Password Management
Most people tend not to use difficult and/or varied passwords, because password management can be a tedious and time consuming task. When we're paying bills or shopping online, we want easy and instant access to our account so we can complete our tasks. It's frustrating to get "bad password" error messages, and it's a hassle to answer challenge questions in order to request a password reset. Because it's nearly impossible to follow safe password practices without writing down all our passwords, the only way to securely manage passwords is to use some type of password management software.
There are two good options here, and both are easy and inexpensive. The easiest thing to do is to utilize file encryption software to protect the document that has the passwords stored on it. For this, I recommend something like Absolute Password Protector by Last Bit Software. They have a free trial version you can download to see how you like it. This software uses strong 128 bit encryption to securely encrypt any file you have stored on your computer - making it easy for you to access but very difficult for a thief to utilize. With this software, you can store all your passwords in a Word, Excel or text file and then encrypt that file to keep it secure.
Another good way to manage passwords is to use an encrypted database to store all of your password information. I use Passwords Plus by DataViz. This is designed to be used on a PDA, but I use it on my computer. Passwords Plus is easy and convenient, but the downside is you have to set up the database by keying in all your accounts and passwords. Both of these methods of password management cost around $29, and it is well worth it. Unlike a lot of software that requires a subscription to keep it functioning, password management software is a "one time" purchase.
Practicing Good Computer Security Habits Will Help Keep You Safe Online
Maintaining "difficult to guess" passwords is just one very important thing you can do to keep yourself safe online. There are many more things you can (and should) do to protect your computer and your data from cyber-thieves and malicious software. A few things to keep in mind are to use a good antivirus and anti-spyware software product, avoid downloading and installing "free" software (it usually contains spyware and/or adware) and never click links in emails that appear to come from a financial institution.
วันจันทร์ที่ 17 พฤษภาคม พ.ศ. 2553
AntivirusPro2009 Removal Guide
http://www.youtube.com/watch?v=srSqbEoOlZA&hl=en
วันเสาร์ที่ 15 พฤษภาคม พ.ศ. 2553
Security Necessities to Prevent Your Computer from Spyware
In the internet world it is vital for users to have a good spyware scan and removal tool because of the multitude of
different spyware, adware, Trojans and other malware constantly looking to attack your system. Many spyware tools available are free and those up for purchase typically do not exceed $30 to $40. Anti-spyware tools will greatly assist in protecting your privacy and restoring full computer functions that spyware may have taken over.
Spyware gets into your computer and invades users' privacy. Individuals or companies install spyware when you download freeware or visit certain web sites so they may track your internet habits and find personal information such as passwords, email addresses and even credit card and bank account numbers. By eliminating these applications from running on your computer you will restore your privacy and you should notice a much more efficient computer system because spyware uses up
its resources.
Finding a good spyware tool can be difficult because of seemingly endless list of programs. Researching online and reading reviews can help you decide which one is best for your situation. NoAdware is recommended by some users and has been a popular download from some sites because it is a user friendly, easy to use program.
วันศุกร์ที่ 14 พฤษภาคม พ.ศ. 2553
Spyware Infection Removal Software and Phishing Protection, www.IDTheftSecurity.com
http://www.youtube.com/watch?v=5qeFiCqzuT0&hl=en
วันพฤหัสบดีที่ 13 พฤษภาคม พ.ศ. 2553
CNET's Top 5 Most accepted aegis apps
http://www.youtube.com/watch?v=kYFMgvNbaDU&hl=en
วันพุธที่ 12 พฤษภาคม พ.ศ. 2553
Pregnant pig computer hackers - Clever Critters - BBC Pets & Animals
http://www.youtube.com/watch?v=8ImZmDYme_s&hl=en
วันอังคารที่ 11 พฤษภาคม พ.ศ. 2553
Need Of Home Computer Security
With the advancement in technology many people are habitual of doing many important activities and processes through personal computer in different forms. For example the people do e-banking, utility bill transactions, and editing office work etc. So in this situation many hackers do hack and put their influence also on home computer security the most important information through locking the computer. After hacking, the professional hackers can also blackmail the people for their necessary needs. Different types of hacking and lock breaking codes are used in this way. Thus need of home computer security arises front of us.
Protection Of Soft Form Information And Home Computer Security
Different steps can be adopted for the strict check form lost of data present in computer by hackers who can also affect home computer security. It has been observed from last decade that day by day cyber crime rate is increasing, and many people even different government authorities have been affected by this problem. There are also some cases that the much secret security information present in computer workstations of different companies becomes lost due to illegal cyber crime. In this state, many companies are going to adopt the protection of firewalls and different security software. Now cyber law is working efficiently to pursue for any illegal action taken by cyber criminals. Similarly, home computer security is also affected.
One should brows through different websites, which can provide guidance in order to save our computer from any incoming danger. Normally some websites regularly update about any incoming innovation in this direction. As today most of Internet communication is through data subscriber lines giving more upstream and downstream data rate as compared to other medias, so it is very easy to find out the solution of facing problem through different sites at real time on hour of need. As similar to this problem, home computer security is also influenced by such hazards.
Precautionary Measures
By using different tips and adopting precautionary measures related to home computer security one can protect his or her personal computer from being theft of utmost important soft form data. To hold home computer security strong, people should not pay bills using their credit cards etc on Internet as it can give a path for hackers to hack and steal our credit card numbers by which they can use our facility. Also many people do online shopping through different resources, which become so much vulnerable sometimes that situation becomes like it is useless to cry over spilt milk. Hence it is better that one should not show his cards first as it can facilitate others to do gambling by making strong the home computer security.
The best remedy for this problem is that peoples should not float their personal information like codes of different bank cards, bank account number information and utility bills information etc on line, so that no one can hack these information. Therefore by using above mentioned steps people can really feel calm and peace while doing any activity on computer by confirming the home computer security.
วันจันทร์ที่ 10 พฤษภาคม พ.ศ. 2553
博大警卫充公亲学生阵线的学生的财产
http://www.youtube.com/watch?v=OuDUYd8oBq0&hl=en
วันอาทิตย์ที่ 9 พฤษภาคม พ.ศ. 2553
Facial acceptance cameras appear to pub in Australia
http://www.youtube.com/watch?v=GUp2aVDQd5U&hl=en
วันพุธที่ 5 พฤษภาคม พ.ศ. 2553
Internet Security - Best Internet Security Tips to Protect Your Computer From Cyber Attacks
In this article you will discover the five steps that every computer user should implement to prevent cyber crime attacks. These days the cyber world is becoming bigger and bigger with rapidly growing number of businesses and individuals using internet as a business place. Naturally, cyber criminals target computers with low antivirus internet security and commit their criminal activities.
However, there are guidelines that need to be followed in order to secure your computer from internet security attacks:
Back-up Data - Savvy computer users are aware of the importance of keeping their data safe and away from internet security attacks and regularly perform back ups. You can back up your data on an external data storage device such is CD, memory stick or external hard drive. The device you use will depend on the data size. The overall idea is that if anything happens to your primary data, you can always retrieve them from somewhere.
File sharing- Another very important thing to be avoided is files with strangers. This makes your computer internet security vulnerable as the files form other computer users may contain malicious infections that without a good anti-virus internet security can potentially destroy your computer or steal sensitive information. Make sure you turn off and disable file-sharing if it is not needed.
Disconnecting from the Internet- It is additional prevention so whenever you internet is not in use just simply disconnect form internet. It lessens the possibility of cyber criminals passing your internet security.
Update security patches- Computer programs sometimes contain bugs that can be an entrance to your computer for any malicious person to attack and potentially harm your computer. Therefore, it is very important to regularly update your security patches and increase.
Maintain up to date antivirus software firewall- Good antivirus software and firewall are crucial components of your arsenal to increase internet security that will protect your computer from attacks. Make sure to keep your anti-virus program and firewall up to date.
วันอังคารที่ 4 พฤษภาคม พ.ศ. 2553
Computer Security Suites - Internet Security Suites
What is a Computer Security Suite?
A computer security suite (also referred to as an Internet Security Suite) is a bundled software package from the same manufacturer that includes several different types of internet security protection. The security software applications are all compatible with each other and work together to provide a thorough blanket of protection against viruses, spyware, adware and intruders. PC security suites normally include anti virus software, anti spyware, and personal firewall protection. Some also include a form of privacy protection, which protects personal data such as account numbers and passwords. Many anti spyware programs will also kill most adware, which is a distant cousin to spyware.
Do I Need a Security Suite?
If you use your computer on the internet, you need (at minimum) anti virus software. If you are using a broadband connection, you also need to use a firewall (hardware firewall, software firewall or both). If you do any business, shopping or banking online, or just spend more than a few hours a week browsing - you really should have anti spyware software. If you download anything at all (software, screensavers, clip art, pictures, etc...you really need some form of adware protection. Although you don't need to buy an internet security suite to get all this protection, it is the cheapest, quickest, and easiest way to go. You can of course, pick and choose your internet security software from different manufacturers, but buying a suite is much easier.
Can I Count on an Internet Security Suite to Protect My Computer?
The key to successful computer protection with a computer security software suite (or any internet security software) is regularly updating the software. New viruses, spyware, adware and hacks are introduced every day, and your degree of protection is only as good as the last update. Just about all top quality security software includes an "auto update" feature that lets you choose to have the software automatically check for and install updates daily. It's always a good idea to turn on automatic updates so you don't have to remember to manually do this.
As with just about any program that requires regular database updates, a subscription is usually required. After purchasing the software, it will normally run for a year before it's time to renew the maintenance subscription. This is normally a small annual fee that also ensures you get program upgrades.
Recommended Computer Security Suites
Internet security software suites produced by large, reputable vendors like Symantec, Trend Micro, McAfee, Zone Labs, and Panda are excellent and should provide you with great overall protection. Although a bit more expensive than their small company counterparts, it's best to stick with one of the big boys; especially if you are relatively inexperienced with computers and software. After all, you are buying the internet security suite software to protect your data, your computer and your most valuable asset - your privacy and identity!
วันจันทร์ที่ 3 พฤษภาคม พ.ศ. 2553
Streetwise Guide to PC Security
Spam is on the rise, malware infections are on the rise, botnets are growing bigger and more Internet users are turning into advance fee con artists. Pretty grim picture isn't it? No, I do not want to sound pessimistic, but the reality is that no piece of computer security software can protect you completely against Internet based threats. What am I saying... throw away all your spam filters, firewalls and anti-malware applications? No, not at all, they play an integral part in our protection against cyber threats, but even the best tools in the world can fail dramatically if they are not used by streetwise cyber citizens.
I guess most of you are glaring at your screen right now, asking yourself, "what the hell is he talking about?" Lets take two persons and put them in a dangerous neighbourhood, the one person is a high profile celebrity, dependent on his bodyguards to keep him safe and the other person is a normal guy who grew up on the streets and learned to take care of himself. Which one is the most likely to survive, all by himself, in this dangerous neighbourhood? The latter of course. Why? Because he is streetwise, he doesn't need fancy tools and bodyguards to take care of him, he knows how to think for himself and what to look for in order to stay out of the heat. Computer security is a lot like that, you don't need to be an Einstein to stay safe in the online world, it is no rocket science to be streetwise, you just need to how to stay on top of your game, you catch my drift? Right, enough street slang, so lets get to the point.
I stumbled across a very interesting article about PC security, published by BitDefender. A BitDefender employee told me that the article is quite old, but nevertheless, it is a generic set of PC security rules that are still very applicable to computer security these days. I have a lot of positive things to say about this article, but it is not without some criticism, so without any further ado, lets take an objective look at the list of rules called the Ten Commandments for Your Computer Sanity.
"1. Don't assume anything. Take some time to learn about securing your system."
Perhaps the single and most important rule of them all. If you are not sure, ask for advice and try to understand why it is important to take certain precautions, don't just assume that's the way things are done.
"2. Acquire and use a reliable anti virus program. Select an anti virus that has a consistent track record. Checkmark, AV-Test.org and TuV are among the most respected independent testers of anti virus software."
So many people go out and download the first anti-virus program that pops up on their screen. Malware infested products are marketed very aggressively, so these less known, but dangerous applications often occupy top spots in search engine results and online contextual advertising, so never trust a download just because it appeared in the search results of your favourite search engine. Visit Spyware Warrior for a comprehensive list of rogue anti-spyware products.
"3. Acquire and use a reliable firewall solution. Again, independent reviewers are your best bet for reasonable choices. Some operating systems come with a firewall, which only filters incoming traffic. Use a firewall that can control both incoming and outgoing Internet traffic."
Firewalls were once a thing for computer experts and large corporations only, it was uncommon to find a firewall installed on a normal end user's computer. Like mentioned in the rule, we even have firewalls built into our operating systems these days (not that it really helped the online community in any way when I come to think of one specific operating system). But the necessity of a firewall increased in the last couple of years and it is irresponsible and suicidal these days to browse the Internet without a proper firewall that provides bi-directional protection. You need to know what is transmitted to and from your PC. You don't want malicious code to infiltrate your system and you don't want confidential and sensitive information to leave your PC without your consent.
"4. Do not open e-mails coming from unknown or distrusted sources. Many viruses spread via e-mail messages so please ask for a confirmation from the sender if you are in any doubt."
If more people can adhere to the first part of this rule we will have a lot less virus breakouts and spam. Each time you open a 'harmless' spam e-mail you give the spammer reason to send more spam because you respond to his e-mails. I have discussed this topic a hundred times before so I'm not going into it once again. With regard to the latter part of this rule, it won't be wise to ask for a confirmation from the sender in my humble opinion, you are just looking for more spam by replying to an unknown source. With so much e-mail forgery happening these days, it is anyway a complete waste of time to respond, because the sender's e-mail address is most likely invalid or spoofed.
"5. Do not open the attachments of messages with a suspicious or unexpected subject. If you want to open them, first save them to your hard disk and scan them with an updated anti virus program."
Once again, the first part of this rule is a piece of gold and can save you a lot of headaches if you stick to it, but I do not agree with the latter. It is almost like saying: "Don't shoot yourself with a 9mm, but if you want to, go ahead and take a peek down the barrel to make sure you are using blanks". If you get an e-mail with a suspicious or unexpected subject and on top of that some executable file, Word document, PDF, ZIP or any suspicious file attached to it, don't mess around with the bloody thing, delete it.
E-mail scanners have been with us for quite some time. The e-mail scanner of an anti-virus package uses the same database as the file scanner, so if an e-mail gets past your e-mail scanner, using the latest virus definition database available, what makes you think that the file scanner will do any better? Should you trust an attachment just because your anti-virus program told you the file is clean? A suspicious attachment from an unknown source has a 99.9% chance of being malicious, so why even bother scanning it? Many inexperienced users don't even know how to save an attachment and run it through an anti-virus scanner, so they walk a big risk of infecting themselves. My advice, if you don't know how to handle suspicious files properly, stick to the first part of this rule and ignore the latter.
"6. Delete any chain e-mails or unwanted messages. Do not forward them or reply to their senders. This kind of messages is considered spam, because it is undesired and unsolicited and it overloads the Internet traffic."
Pure words of wisdom. Many people simply assume that friends and family enjoy receiving junk chain letters and unbelievable, ridiculous stories that you need to forward to everyone in your address book. Who needs spammers if you have friends like this? Apart from spamming all your friends and breaking anti-spam laws, it also comes down to bad e-mail etiquette. The fact that your friends are on your mailing list does not give you the right to send them anything you want. Take your recipients into consideration and think before forwarding jokes, petition lists, chain letters and other kinds of junk mail to them.
"7. Avoid installing services and applications which are not needed in day-by-day operations in a desktop role, such as file transfer and file sharing servers, remote desktop servers and the like. Such programs are potential hazards, and should not be installed if not absolutely necessary."
There is a lot of truth in this, but unfortunately this is easier said than done. The blame lies on the side of software developers and not the end user installing the software. Ordinary users simply install the software and use it whenever it is needed. Little do they know that the software is running 24/7 in the background eating up valuable system resources. These programs put themselves in the Windows Start-up without informing the user about it, or the option to load the software at Windows Start-up is often pre-checked during the installation, so the user has to opt-out to prevent this from happening. These pre-checked options are often missed, because the user simply rushes through the 'easy' installation process. There is a reason why certain developers make the installation procedures so easy.
When I analyse HijackThis logs of malware victims, I often see loads of auto-update managers, system tray utilities, P2P clients and all kinds of 'junkware' loaded in the Windows Start-up. These users are always stunned by the sheer performance of their computers after I removed all these useless applications from the Windows Start-up. Ask someone to check the Start-up section of your PC and remove all the redundant entries. You will be amazed to see what difference this can make in your PC's performance. Don't leave file-sharing software like LimeWire, Shareaza or KaZaa running in the background all the time, they create a weakness in your security setup and make it easier for hackers to gain access to your system. As the rule says, these programs should rather be avoided if possible.
"8. Update your system and applications as often as possible. Some operating systems and applications can be set to update automatically. Make full use of this facility. Failure to patch your system often enough may leave it vulnerable to threats for which fixes already exist."
Most people are guilty of not updating their system on a regular basis. But there is a reason why people are afraid of updating. Remember what happened when Service Pack 2 of Windows XP was released for the first time and if I am not mistaking, history repeated itself with the release of Service Pack 1 for Windows Vista.
I know one should lead by example, but I am perhaps the worst of them all. I haven't updated several of my applications in years, because I am happy with the versions I am using at the moment and don't want some update to screw everything up. If you stick closely to rule number one you automatically take your computer security to the next level. If you pay attention, to which sites you visit, which files you download and which programs you install, you can easily skip this rule for years without any malware incidents at all. Still it is wise to update your software when you have the chance. It is better to fix a broken wall even if you are never bothered by the outside world. The problem is however, you never know when the outside world might start to bother you, so rather be prepared than sorry.
"9. Do not copy any file if you don't know or don't trust its source. Check the source (provenance) of files you download and make sure that an anti virus program has already verified the files at their source."
Will you use a box of aspirins, from an unknown source, left on your doorstep? Off course not, even if you are familiar with the specific brand of aspirins, you have no idea where they came from. How can you be absolutely sure that they are really aspirins? Well, the same goes for computer files. If you can't verify the reliability of the source of a specific file, how can you trust the contents of that file? You have no idea where the file has been and you have no idea whether the contents of the file is really what it should be.
"10. Make backups of important personal files (correspondence, documents, pictures and such) on a regular basis. Store these copies on removable media such as CD or DVD. Keep your archive in a different location than the one your computer is in."
Backups, ah the one thing that no one ever does. Have you ever thought about what you can loose if you suddenly got infected with malware? What if a cracker gains access to your PC and delete your favourite music collection? Backups play a very important role in PC security, especially when it comes to system recovery after a malware infection or system failure. Any proper security setup should have solid backup policy. Without backups you will never fully recover from a severe system crash. Backups are your insurance against data loss. So if you are not in a habit of backing up your most important documents and data on a regular basis, rather start doing it before it is too late. BitDefender's Total Security can be set to perform automatic backups for you.
We live in an age where we can't rely on software alone to protect us from online threats. You are responsible for your own safety online, software applications like firewalls and anti-virus programs are only tools to help us in situations where things are out of our hands. Your personal computer security depends on your willingness to stick to these rules, being vigilant and using common sense. Treat everything as a threat until you can prove otherwise, this is the safest approach in the digital Wild Wild West.
Article References: http://www.bitdefender.com/site/Virus-Tips.html
วันเสาร์ที่ 1 พฤษภาคม พ.ศ. 2553
Do We Really Need A Registry Cleaner
The answer to that question regarding the need of registry cleaner is an obvious 'yes'. If you clean your registry on a regular basis your system will run faster and more efficiently. But if one asks such a question then the possibility is that the person really does not know what the system registry really is. So, let's venture to explain. The windows registry is a central database where windows, the operating system of the computer, keep a record of all the changes that are made on the computer. This may be related to hardware or software of the permissions given or withdrawn from the profile of a user. It is the registry that manages the startup and shutdown as well as the operation of the operating system so to speak. If this central database gets clogged with useless data the system will slow down if not crash altogether. Here is where registry cleaning software makes its importance known.
How The Registry Gets Clogged
It is during the process of downloading programs or files from the Internet that the registry gets filled with redundant information such as ActiveX controls and stuff. Some hardware such as plug and play peripherals also has to be registered in the registry. But when these programs and peripherals are removed the registry entries still remain. This takes up space on the drives as well as slows the system down. A utility such as the windows XP registry cleaner or the free PC registry cleaning software can remove this stagnant information from the registry and make the system more efficient and faster.
The Registry Replaced The INI storage system in Win 95
The windows registry was introduced in Windows 95. Before this the system used to store configuration information in INI files. Each software package had its own INI file system. These files were scattered all over the system's hard drive, which made it very difficult to keep track of the system settings. Though the central registry system assimilates the configuration settings it has its own set of problems. The greatest problem it poses is that it is a single point of failure. One snag and the whole system crashes.
Don't Manually Mess With The Registry
Even though it is possible to edit the registry manually and clean it, it is not recommended. Do not touch the registry unless you know exactly what you are doing. It is better to download a registry cleaner from the Internet to get a thorough job efficiently done and get the system up and running.
วันศุกร์ที่ 30 เมษายน พ.ศ. 2553
7 Tips For Computer Security and Virus Protection
Computer security is a vital issue for anyone who surfs the net on his or her PC. Any computer that is connected to the Internet is exposed to thousands of malicious, viruses, spyware, hackers, and other nasty Malware that can ruin a system, cost lots of money for repairs and lose important data, files and folders.
Here are some hands-on steps that you can take to protect your computer, data and private information from the hackers, Malware, viruses, spyware and thieves and ensure the best in computer security.
1. Good Virus Software - Make sure to always install and run the best virus software on your computer. Always have the best anti virus software installed and running on your system.
2. Real Time Virus Protection - Make sure that real time protection is part of the virus software you use to avoid being infected by drive-by infections that can happen just by visiting a website.
3. The Best Security via a Web Browser - Internet Explorer web browser is full of security risks; Firefox is a much better choice.
If you are using Firefox make sure that you properly set up the security options:
1. Go to Tools and select Options
2. Select the Security Tab
3. Select the following options in the Security Window:
Warn me when sites try to install add ons
Tell me if the site I am visiting is a suspected attack site
Tell me if the site I am visiting is a suspected forgery
4. Firewall Protection - Firewalls block hackers and unauthorized access from other networks. Windows comes with a default firewall, or you can choose from various free ones for extra protection that can also be customized.
5. Computer Administrator Protection - Windows operating system allows you to create different users, such as guests versus using the computer in Administrator mode. This helps to avoid being logged in as administrator, which makes vital areas of your computer more protected. You can create a guest user and surf the net with that profile, which will make your system more secure.
6. Dangers of Unknown Email Attachments - Many get virus infections that are sent as attachments via email. Never open files that come from sources that you don't know, or don't trust. While Yahoo and other free email platforms do have virus scan protection it is not always accurate and can miss a virus attached to email disguised as something legitimate.
7. Be Cautious about Shareware - Shareware is a term that refers to free software or program that can be downloaded from a variety of websites. These can be risky because they can carry viruses and spyware. Be careful with these downloads and be sure the website that offers them is safe.
วันพฤหัสบดีที่ 29 เมษายน พ.ศ. 2553
Smashable Computer!
http://www.youtube.com/watch?v=Vh3CRRygsY0&hl=en
วันพุธที่ 28 เมษายน พ.ศ. 2553
Things you should do with your computer - How to make your experience better IT
It is often difficult to understand the actions of others. If someone works on computers you see things. They often find what they are doing wrong but they suggest that problems in the hope that this will help them become more productive and Improve Their personal experience with computers.
I often worked on a computer, remove spyware and virus problems, except that the same person both days after contact with another problemType. The re-infection of the computer tells me that the person did not heed my advice, and I'm puzzled as to why this happens, but happens frequently.
Here is a list that I hope will follow you to make your life much better IT. It 'also help computer tech could think to keep the hair and some of his favorite:
Always active on the Internet with antivirus software to go.
Always on the Internet with anti-spyware software to goon.
Do not use Instant Messenger.
Protect your data access for web sites - Do not Give to anyone else.
Never provide your bank account information on a Web site that is not running, the HTTPS protocol.
Never go on porn sites.
Always a complete virus scan once a week.
Back up data during the week.
Monitor the activities of the child on your computer - in particular the use of the Internet.
to encrypt or password protect important information.
Perform periodic cleaning diskDrive - Remove unneeded files.
Do not blame someone for your computer problems, if not on the measures to be taken.
Now we want a closer look at my list of suggestions for more:
When you access the Internet without antivirus or antispyware-go it's like when you open the door to your house - at some point, bad you check the door and suffer the consequences.
Instant Messenger could allow an attacker to obtain a new port (an entry such as drills)Access to computers - this is bad for computer security. E-mail is much safer to use.
Enter your account information is wrong. What happens if the person who gave you lose your phone or a piece of paper, that the information on it? There are always people looking for private information.
Enter information to a website not HTTPS transferred data to be acquired by hackers. This is really bad for you, but very good for them.
Visit porn sites is a guaranteed way to get in touch with spyware and viruses. If you are on a site for a long time, you can leave with a lot of malware from the Internet.
If should not be a virus scan weekly, are taking risks do not take it.
Have a preventive maintenance at home. Backing up data on a computer is the same - to prevent data loss in the future.
Part of being a good parent, keep your kids out of trouble. You must haveGuidance for adults treated with the computer. The Internet, as this world has many bad things. You need your child about what is right and wrong and how to teach tackling it.
If someone steals your PC, what they can do with your data in clear text?
Too much clutter is a bad thing. Regular cleaning of the computer file is a way to make your computer a tool that is easier to use, and things to find. Also, you have more space to store data - always a good thing.
Youmust always be responsible for your actions. Why blame someone else for a problem you had with a few simple precautions can be prevented?
วันอังคารที่ 27 เมษายน พ.ศ. 2553
Define Computer Virus
A computer virus is a software program, script, or macro designed to infect, destroy, modify, or cause other problems with your computer or software programs. The user may protect him by using an anti-virus protection program. The anti-virus protection program designed to detect, protect, and clean any computer viruses. This is the most basic way to define a computer virus. There are tens of thousands of viruses out there with many more created on a daily basis. The protection program needs to updating on a constant basis. The computer needs updated with its running system, email and files in order to keep a completely safe PC. The normal use of any computer still puts the system at risk of being compromised by hackers unless you provide an anti-virus program for your protection along with a personal firewall.
A computer virus has been described as a parasite that intentionally will enter your PC for destroying your system, files, and any programs that you have on your system. The virus will attach itself to files or boot sectors in order to replicate itself the user is unaware of the problem and spreads the virus to others.
The hacker usually creates a virus that will not come to play until the first person receives it passes it on to their network. The problem then arises on where the virus came from, what type of virus, and what are the damages. The final definition concludes that a virus creates damages to the computer system by infecting the PC either inadvertently or deliberately. This explanation helps you to understand the difference between a computer virus and the Trojan program. The virus replicates itself while the Trojan Program does not.
"An ounce of prevention is worth more than a pound of cure." That holds true with a computer virus because the damage can be so devastating that your hard drive crashes leaving you with nothing. You would need a new system and all your files destroyed. A worse case scenario being that all your personal information taken will leave you into problems that affect your financial well-being.
Many different viruses affect your PC. There are few major parts to your PC that can be affected, which destroy the system. The email account can be compromised causing you to obtain a worm that you pass to your network. The virus or worm destroys your PC along with everyone you send E-mail. The next type of virus is also known as macro viruses from files, boot sectors and e-mail their effects.
The fact is that macro viruses are the number one problem for Internet users. The virus, spread through shared documents and grow every time you increase a new document in the document to the network, therefore, the ability of macro-virus, Web-highway driving. The macro-attacks as many users open the infected document, then if their system isand create a document that you are infected. The process goes on forever, until someone discovers the problem and is working to resolve it. Do not always think to ignore a virus that no harm will be done. The virus is an infection that, until it grows every PC that comes in contact destroyed.
วันจันทร์ที่ 26 เมษายน พ.ศ. 2553
Coast to bank AM - 25 Mar 2010 - UFOs, Cyber-Spying, Seeds, & Bats allotment 4/12
http://www.youtube.com/watch?v=p8iXjmnl7HI&hl=en
วันอาทิตย์ที่ 25 เมษายน พ.ศ. 2553
The Vulnerability Economy
http://www.youtube.com/watch?v=QlB-xysTv4c&hl=en
วันเสาร์ที่ 24 เมษายน พ.ศ. 2553
วันพฤหัสบดีที่ 22 เมษายน พ.ศ. 2553
How to clean your computer - the absolute path:)
http://www.youtube.com/watch?v=cgWnYoPkgys&hl=en
วันพุธที่ 21 เมษายน พ.ศ. 2553
Stop H*Commerce War Driving
http://www.youtube.com/watch?v=nNmd8GYwoNM&hl=en
วันอังคารที่ 20 เมษายน พ.ศ. 2553
Network Security Hardware
The name has become a global village is more realistic than fiction after the widespread use of the Internet in every country in the world. What the Internet is not effective computerization of the world. Like many other things, the Internet offers both good and bad. The consensus is that much of the good things the bad things. But the questions are serious about data security. As more and more facilities, such as military, diplomatic and financialInstitutions rely on the Internet or other network for transferring data and simplify the process, the number of people trying to misuse of such data also increasing. This is different to avoid security measures data from the network managed to be accepted. Most measures of data security in relation to software applications. Options computer hardware network security are also used.
To understand the importance of dataSecurity, consider the case of a bank with branches on all this is a country. To streamline the operation, most banks to set up a private network or a network connected to the Internet to transmit financial data. A person with sufficient hardware and software skills to sneak into the network without permission, and you change the data according to his will. These people are called hackers. In the case of a bank as a data change means change or loss of money, Implementation of the state of the art security measures to protect data is absolutely necessary.
The hardware components are needed for a computer network using network cards and nods to connect computers together through a physical connection such as cable or electronic signals by satellite. You should also network and software for database management for the effective functioning of the network. In most agreements, networking, a> Computers, servers, known as the acts, a source other computers and act as a nod to the computer center.
Usually, there are elaborate security measures to prevent unauthorized access to a network. Software precautionary measures such as firewalls, anti-virus and anti-hacking software packages and encryption technologies have been widely used. Such systems are necessary to prevent data theft and other malicious intentions. The problem withSoftware packages for network security is that packets of this period, especially after it becomes obsolete. To understand hacking in general, as software packages for a certain period.
Thus, the computer security hardware device is a better choice to make. Top manufacturing companies network routers have hardware firewalls agreement for both types of network systems: Ethernet and wireless. The firewall settings can be adjusted easily. Several companiesNetwork security devices also offer virtual private network for '. But the most important to provide water-tight security for your network is that you constantly update the Requirements to hardware and software.
วันจันทร์ที่ 19 เมษายน พ.ศ. 2553
Your security on the Internet - Yesterday and Today
Back in the "old" days of the Internet, about 8 to 10 years, we worry less about viruses, worms, trojans, etc that we do today. One reason for this complacency was that most of us, a slow and narrow by using the dial-up. It meant our computer is connected for relatively short periods, and it took forever to download anything.
Today, many people in an 'always on' high-speed or broadband connection are very different things. The computeris with the Internet every minute they are connected. Malware much more dangerous and sophisticated as it was only two or three years. Try to protect your computer from these threats by installing and maintaining security software properly.
Do not be intimidated by this. It is not difficult. Once everything is up and running, only takes a few minutes a day, all to keep up and maintain your computerSafe.
The computer security and not only your concern. If your PC is infected, can touch or attack one of the other 600 million computers connected to the Internet. Thus, each of us a public function, the duty to keep our computers clean and protected. Not to mention the time, money and frustration you will save by avoiding problems.
If you're a high-speed connection, another thing you can do, you should call your Internet ServiceProvider and ask them to help in creating a manual connection. This means you have to click an icon on the desktop to connect to the Internet, and another symbol, probably separated in the notification area (system tray).
A small inconvenience, perhaps, but the connection is only when you need it. And most importantly, you will know and be more aware when it is active.
วันอาทิตย์ที่ 18 เมษายน พ.ศ. 2553
Security Suites Computer - Internet Security Suite
What is a suite of computer security?
A Computer Security Suite (Suite, also known as an Internet-Security) is a software package supplied by the same manufacturer, the protection includes different types of Internet Security. The software security applications are all compatible with each other and work together for intruders to complete a blanket protection against viruses, spyware, adware e. PCsecurity suites generally include anti-virus, antispyware and personal firewall-protected. Some also include a form of privacy which protects personal information such as account numbers and passwords. Many anti-spyware programs also kill most of the mistakes that a distant cousin, is a spyware.
I need a security suite?
If you use Internet on your computer, you must (at least) an anti-virus software. If you have a broadbandConnection, you need a firewall (hardware, software firewall or use both). If you do business, shopping or banking online, or simply spend more than a few weeks now to navigate - you really should have anti-spyware software. If you download anything (software, screen savers, clip art, pictures, etc. .. You really need some form of adware protection. Although it is not necessary to buy its Internet security protection given to this, is the cheapest ,easier and quicker to do. Of course you can also choose your internet security software from different manufacturers, but buying a suite is much easier.
I can count on an Internet Security Suite on my computer?
The key to successful protection of your PC with a suite of security software-computer (or internet security software) is the periodic update of the software. new viruses, spyware, adware andHacks are introduced every day and the level of protection is only as good as the last update. Virtually all top quality security software includes a "" Auto Update every day That you can choose to control the software and install updates automatically. It's always a good idea to turn on automatic updates, so you do not have to remember to do it manually.
As with almost any program that requires regular updates of the database, subscription is generally required.After purchasing the software, usually a period of one year before it's time to renew your subscription maintenance. This is usually a small annual fee, which should also ensure that the program updates.
Recommended Computer Security Suite
Internet security suite software, excellent product by large reputable companies such as Symantec, Trend Micro, McAfee, Panda and Zone Labs security and provide excellent overall performance. Although a bit 'moremore expensive than their counterparts, small businesses, it is best to keep up with one of the big boys, especially if you are relatively inexperienced with computers and software. After all, you need to buy Internet Security Suite software for asset protection of your data, your computer and your most precious asset - your identity and privacy!
วันเสาร์ที่ 17 เมษายน พ.ศ. 2553
Fix Windows Registry Errors - Four tips for correcting errors in the Windows registry immediately
Windows XP is an operating system developed by Microsoft, was used on personal computers, including home and business desktops, laptops and media centers.
Sometimes after you start the computer for a while ', the computer starts Windows Registry shows warnings or errors. Why you get the Windows Registry errors and how to get rid of this error? There are four facts:
1st your desktop or laptop computer running slow, and it takes foreverto respond when you open any software.
2 °, the computer hangs without giving any reason.
3rd show computer screens, often in white.
How to troubleshoot errors when Windows registry?
In fact, most computer users face the question of guilt in connection with the Registry. Some of them even spend hundreds of dollars to fix these errors. Fortunately, you can practical advice on how to solve the problem without aPenny. Follow this procedure for the errors of the Windows registry to resolve the problem:
1 Check the configuration of your computer. You can find if there are programs using this corrupt system. Therefore, you should remove it without hesitation, because these corrupt programs lead to blue screen or death can.
Using 2 hard drives defragmented regularly. Defragment hard disk is a good way to make free space on your PC. Disk Defragmenter helps organize files on your hard disk to increaseTake the speed of the hard drive ...
3rd install a good antivirus software to defend the security of your computer. If you, your computer virus problems are attacked. Some harmful viruses to disable some programs on your system, the maximum you can bring your computer, not on his.
4 Clean the registry errors your system. With regular use, keeps increasing the size of the registry and when it is very high, theSystem works slowly. To return your pleasant experience in computer, you must clean up the mistakes of the registry in time with the help of registry cleaning tool.
If you regularly follow the suggestions above, your computer run faster and error free.
วันศุกร์ที่ 16 เมษายน พ.ศ. 2553
You have a virus? Removal Basics
If a virus is likely that the doctor prescribed an antibiotic. It 'a pity the same can not provide for a computer. A computer virus attacks on multiple levels. Moves throughout the system and can be difficult to remove. In advanced cases, may enter the root zone and prevent boot. In this case, you must delete any image () to your hard drive and install the operating system. This is time consuming and unnecessary if youhave the right protection. A regular user, it is also their ability to do this is in the eye and take their computer to a repair shop. Do not! Until you read this! I will help you try to go it alone. If the problem still not resolve shop I beseech you find yourself repair, as an alternative to a computer. If you know a friend or family member that a computer doing little more than they probably can.
First, you need a goodAntivirus program. See my website for recommendations. An antivirus program can protect, but if you're already infected, please read on. They are the program and has to find a virus and you feel GREAT! That was easy. Not so fast! Is written to avoid these nasty things away. The virus replicates to replicate, and move to avoid detection and removal. You have the virus as you attack.
What I tell you now, you have to weigh carefully. IfYou must use a backup program. Remember, most backup programs only returns the computer to a predetermined state, which means that your computer 'back in time' and do not retain any additives such as updates to programs, drivers, files (pictures and everything , because what they have been saved.), or anything else. I know that the active use of a backup program for many reasons. (What if your hard drive? Failed).
If you can not then have a backup copy of what is hereis necessary. Running an antivirus program to hunt and find the virus. I found that you must run multiple times, but you need to know that you disable System Restore (XP user). System Restore is the virus SAVE! Please note that we seem to disable System restore all restore points again. This is what you want to do. Here's how it goes. Right click on My Computer and select Properties. Select the System Restore tab and check, youa moment, but this is normal. Go back to your desktop and run the antivirus. If you have any malware, it must go back and turn System Restore back away. In my opinion, System Restore is not really a program of great value. When I need does not need to be recovered!
A quick note here if you want a backup system and you need a program that you can visit my website. You are also free from the Microsoft Backup Utility (if installed) by clicking Start / Programs / Accessories /System Tools / Backup. If not installed, you can add it from your installation CD. They occupy space, so choose only C (system drive) and turn off all unnecessary and select System State.
Good luck!
วันพฤหัสบดีที่ 15 เมษายน พ.ศ. 2553
Computer security is based spam filter
With the rapid growth in the volume of spam are sent worldwide, spam filters is becoming increasingly important every year. Nucleus Research estimates that the average worker receives about 7,500 pieces of spam each year. Not only does this take time away from normal work duties, but these pieces of spam are often malicious attempts by criminals to access Internet information to your company private or otherwise compromise safety. One of the best ways E-mail to ensure safety is to use the software to eliminate spam from your network out through the use of spam filtering.
The FTC Spam Summit 2007 concluded that spam is the most important use of cyber-criminals to carry out their crimes. These criminals prey to companies that do not have adequate spam filtering software. You usually have one of two objectives: they want or private information (also known as phishing) or are planning to create a door to keep your hacks> Computer and compromise your site and email security. Sophos reported that every day there are 6000 sites have been compromised without the owners' knowledge of them.
E-Mail Security is easy to get your package with the right anti-malware. These packages not only remove viruses and spyware from your system, but the threats before they ever reach your network to block spam at the connection level to save precious bandwidth to stop. Advanced spam filteringsoftware can filter out the vast majority of dangerous emails before they reach your inbox.
A very important feature of a spam filter is incoming and outgoing e-mail scanned for viruses and quarantine suspicious messages. Without this feature, they can spread virus and wreak havoc on your system, delete files, shut down the operating system and open environment cyber criminals taking advantage of private information they find. The spam filtershould update and run automatically without any action required of the employee.
There is no doubt that security must be stopped in order to receive spam email. However, instead of wasting costly man-hours to delete spam, spam filter, the correct solution, this responsibility to employees that can handle a big increase in productivity.
วันพุธที่ 14 เมษายน พ.ศ. 2553
Windows Vista Demo: Understanding user accounts
http://www.youtube.com/watch?v=v5-zmbx0qqg&hl=en
วันอังคารที่ 13 เมษายน พ.ศ. 2553
MapleStory V84 Evan Hack
http://www.youtube.com/watch?v=Z0pqWz-IAbg&hl=en
วันจันทร์ที่ 12 เมษายน พ.ศ. 2553
The Security Architecture Training CISSP Exam DVD Video
http://www.youtube.com/watch?v=SyJPiVU3AmI&hl=en
วันเสาร์ที่ 10 เมษายน พ.ศ. 2553
Crack for spyware
Do you know what your computer is doing while you are away? You might be surprised at all the things you can withdraw your computer on a daily basis. First came viruses, and it was a serious threat for many years. We have heard of such infections, such as the Love Bug virus, the virus Doomsday, and many others. The majority of these can do serious damage to the system. Today, the greatest threats to your computer is spyware. What has started as an advertising gimmickout of control. Many companies have begun to abuse the technology.
The concept was simple: create a small program allows marketing access to their purchasing habits of customers. Many large media companies began to avidly and has more to their spyware. A typical spyware program today is constantly updated by your habits and activities and send back to the starting point. Even if you do not take sensitive information like credit card numbers or bank accounts, proveperformance will be a serious threat to your computer. All spyware is using the computer as a live server. Imagine if you delay you had ten or twenty of these programs would simultaneously. Significantly slow down your computer!
So, where are these spyware? You can be infected with a variety of sources. Some can be downloaded to give you access to various functions such as research net, coupons, or tips online. Some areBundled with legitimate programs downloaded. Others are installed without your consent. No matter where you are, because the computer more spyware at some point or another.
The trick is to figure out how to get rid of it. There are many programs on the market today that can help with these annoying little programs. Many anti-spyware programs are bundled with antivirus protection for an integrated solution. Others can be purchased separately. There are also a wide range offree anti-spyware software that you choose to look so good. Some of these are actually spyware in disguise, it is important to do your homework in advance. If you have a Windows-based system, Microsoft has an anti-spyware program that is free for download on the website.
There are also many online websites designed to detect spyware. It only takes a few minutes to scan your system and then you can take care of all the problems that areacross.
The decision to crack for spyware is a personal decision. Some people may be less attention, while others are a terrible plague. Your thoughts and feelings come into play when you choose your action. Some scan your computer once a month to get rid of possible infections, and other daily scan their systems for spyware infections. Whichever you choose, make sure the reputation of a program that isthe best possible results. Good luck!
วันศุกร์ที่ 9 เมษายน พ.ศ. 2553
GetConnected - How To - Secure Wireless Router Setup
http://www.youtube.com/watch?v=9UFh0W_Z3kI&hl=en
วันพุธที่ 7 เมษายน พ.ศ. 2553
In Action: Virus hippi
http://www.youtube.com/watch?v=mQPxxMlfLp4&hl=en
วันอังคารที่ 6 เมษายน พ.ศ. 2553
The Orb - The world's first and only Ball Camera Demo
http://www.youtube.com/watch?v=9TdVrsAfWCA&hl=en
วันอาทิตย์ที่ 4 เมษายน พ.ศ. 2553
Kaspersky: Virus before you even looking on YouTube!
http://www.youtube.com/watch?v=6f3K295RjKc&hl=en
วันเสาร์ที่ 3 เมษายน พ.ศ. 2553
Crime: The Real Internet Security Problem
http://www.youtube.com/watch?v=rZ1rkIy0dMM&hl=en
วันศุกร์ที่ 2 เมษายน พ.ศ. 2553
As body computer (Part 4 of 9)
http://www.youtube.com/watch?v=hReEaZNOxnU&hl=en
วันพุธที่ 31 มีนาคม พ.ศ. 2553
Like Cinderella, the password of your friends' Facebook, MySpace, Twitter runescape, Gmail, etc.
http://www.youtube.com/watch?v=RoDSbtRHEeU&hl=en
วันอังคารที่ 30 มีนาคม พ.ศ. 2553
1 / 4: OSI archetypal affection for Cyber Security Act CISA and CISSP candidates
http://www.youtube.com/watch?v=42J3p2VGzcA&hl=en
วันจันทร์ที่ 29 มีนาคม พ.ศ. 2553
Strong Passwords - Customer Friendly Computer Security
Going to an office and look under the computer keyboards and in the end there is a small piece of paper on which the login ID and password. Probably everyone has forgotten the person.
This shows a serious problem with the use of networked computers to the economy. User apathy and arrogance, information security is often combined with the aim of defeating the security policies established.
What happens is that IT security policies clash with usability.Most customers do not follow the policy, were too difficult. A place is IT policies and compliance of users at the time of the collision transfer to a secure computer system. The login screen.
Let us first agree on a definition of a strong password.
From Webopedia, a password that is difficult to recognize the human data and computer programs, effectively protect against unauthorized access. A strong password consists of at least six characters (and characters rather thanThe stronger the password) that a combination of letters, numbers and symbols (@, #, $,%, etc.) are admissible. Passwords are usually case-sensitive, so a strong password contains letters in uppercase and lowercase letters. Strong passwords do not contain the words found in a dictionary or any part of the name.
Customers do not have the passwords difficult. Sorry, just will not! For example, you have two passwords: 1XC% & 27m3 and parrott5. What is the strongest? WhichContinue to use your customers?
The key is education. End users should be educated to the seriousness of computer security and IT security professionals should be aware of the needs of its user base.
You should avoid passwords sequential parrott1, parrott2, parrott3 ... You should use a password that is easy to remember, but not the use of a dictionary. Maybe combine parts of two words with capital letters and numbers.
IT SecurityProfessionals may not like this compromise, but it is better than passwords that are easily broken.
Strong passwords are for the security of computer security, but they are the best way to control access? In the second part we will do our alternatives to passwords.
วันอาทิตย์ที่ 28 มีนาคม พ.ศ. 2553
Eagle Eye - Eagle Pass, Texas - UC San Diego
http://www.youtube.com/watch?v=fAdBjDIWUpM&hl=en
วันเสาร์ที่ 27 มีนาคม พ.ศ. 2553
Cisco CCNA 640-553 Security Secure Network Management
http://www.youtube.com/watch?v=WH25FH05zjc&hl=en
วันศุกร์ที่ 26 มีนาคม พ.ศ. 2553
วันพุธที่ 24 มีนาคม พ.ศ. 2553
President Obama on Cyber Security
http://www.youtube.com/watch?v=wjfzyj4eyQM&hl=en
วันอังคารที่ 23 มีนาคม พ.ศ. 2553
There is no privacy?
http://www.youtube.com/watch?v=s0LYs3Ak-iQ&hl=en
วันจันทร์ที่ 22 มีนาคม พ.ศ. 2553
Protect yourself and your PC - Use Anti-Virus Software
There are very few manufacturers who provide a wide range of security software, virus, worms, malware for the fight against spyware, phishing, software and other threats. Kaspersky Anti-Virus 2009, Norton Antivirus 2009 and BitDefender Anti-Virus 2009 are three of the most commonly used anti-virus available.
Norton Anti-Virus 2009 is not only a platform for anti-virus total, which includes anti-spyware. Norton Anti-Virus 2009 can be set quite easilyIt protects your PC very well. Previous versions of Norton Anti-virus more of a burden on the resources of the PC, so that your PC is slow. The latest version is the inclusion of Norton rave reviews from the faithful, marveling at the ease of use and increase speed.
Kaspersky Labs Anti-Virus 2009 is a full-featured anti-virus and anti-spyware software features that is completely configurable.Kaspersky Anti-Virus 2009 does its job very well and is very easy to use once you have installed. Another advantage is that in previous versions of Norton Anti-virus for comparison, is easy enough for the system resources of the computer. Kaspersky Anti-Virus 2009 is very good in the tests from places like ZDNET observed for anti-virus. Some end-user feedback is that Kaspersky Anti-Virus 2009 can be a complex plant and the lack of an efficient customer serviceDepartment.
Overall, BitDefender Anti-Virus 2009 is a great choice. It does not require much resources in the computer system to run, and does not require most of the end user, all the while offering all the functions and features you need. Their technical support team, either by phone or via chat very accommodating and competent. It 'also a great offer, because it is so convenient, especially considering all the built --Flexibility and functionality you get for the cost.
Remember to protect the best way to obtain private information and your computer is equipped with a full-featured anti-virus, which is supported by a reputable company and go straight a few guidelines to follow to choose the installation.