วันเสาร์ที่ 30 มกราคม พ.ศ. 2553

Detroit TSA Security Theater (Part 3) Body Scanner

Has the TSA is proposing for your safety their top priority, as the tag line? If the scanner body will give us the security, or approach to a total police state? This is the updated version, enough with the fake-image scanner body.



http://www.youtube.com/watch?v=R4DbRP1PAXY&hl=en

วันพฤหัสบดีที่ 28 มกราคม พ.ศ. 2553

How To Secure Computer

According to a security and antivirus software company Symantec, it only takes 20 minutes for an unprotected computer to be attacked when it is connected to the Internet. 'S IT security is not compromised, because if the computer is not secure all your data, software and hardware will be in danger. There are several methods that are used to combat the threats. The well-known threats to a computer virus,Spyware, adware, malware, Trojans, threats to Internet security to accidentally delete files and data corruption, unauthorized access and to calculate the attacks by hackers. These recommendations, as they say, that with threats to the security of computers involved.

Up-to-install your antivirus program

One of the most important step for the safety and preventive measure is to install an up-to-the antivirus program and scan your computerregularly with him. An antivirus program acts as a shield for your computer against viruses, spyware and other Internet threats.

Install a firewall

A firewall is a protective barrier to the computer from unauthorized access and protects against hacker attacks. If you do not have a personal firewall software or hardware of the gateway computer then anyone can enter your computer.

Install anti --Spyware

Installing a good anti-spyware removes the risk of data corruption, the corruption of the Windows registry, slow computer boot-ups, browser hijacking and applications fail. The combination of antivirus + firewall + anti-spyware is a very good choice.

Update your operating system with service packs and patches

Service packs and security patches and other vulnerabilitiesVulnerabilities in operating systems. If you use Windows-based operating system auto-update option in the Control Panel and can be programmed to have the operating system updates from Microsoft site.

Beware of suspicious e-mails and attachments

Suspicious e-mail and e-mail attachments is a very common cause of virus. The best security measures that do not open the suspicious e-mails from strangersSource.

Uninstall unnecessary programs

Always the best performance from your computer, uninstall all unwanted programs and then delete the temporary Internet files. You will notice increased performance of your computer.

Deploying encryption

Another important measure is to ensure that the safety of your important files with encryption. Also to protect your valuable data from accidental erasure,Do not read the files only.

The suggestions above offer the best antidote to the well-known off-line and protect the threats.

วันพุธที่ 27 มกราคม พ.ศ. 2553

Designing for Cuba: Necessary In (ter) intervention

us the opportunity of this closed system metaphor for the world will be increasingly accepted view themselves. CS 547 | Human-Computer Interaction Seminar: hci.stanford.edu Stanford University: www.stanford.edu Stanford University Channel on YouTube: www.youtube.com ... Computer Science Technology Policy and Social research design of digital devices, the socialist government security Sneakernet barter economy intranet development of entrepreneurship blog green IT Flash Drive Change Internet web FidelCastro ...



http://www.youtube.com/watch?v=jjhe1Vq592o&hl=en

วันอังคารที่ 26 มกราคม พ.ศ. 2553

Bring the detainees at Guantanamo prisons in the United States

James Lamond is a policy researcher for the national security of the network. Watch more at www.theyoungturks.com. ... James Hoekstra Guantanamo detainees Gitmo Young Turks Michael Shure James Lamond prison network of national security



http://www.youtube.com/watch?v=LHDQdtc9U5U&hl=en

วันจันทร์ที่ 25 มกราคม พ.ศ. 2553

Explaining security

This video describes the security of the computer says and take some of the measures that individuals and businesses can use to keep their data safe and computers. E 'produced and presented by Christopher Barnatt, author of ExplainingComputers.com and Associate Professor of Computer and organizations in Nottingham University Business School. For more information, visit the security pages ExplainingComputers.com



http://www.youtube.com/watch?v=Wc1dOw4j3J8&hl=en

วันอาทิตย์ที่ 24 มกราคม พ.ศ. 2553

Set the necessary skills of a competent technician Computer

Today the world is ruled by people who have dominated the science and technology. A + Certification Training will help make available the skills and knowledge necessary for a competent computer.

CompTIA A + certification is one of the most important awards that every IT can contain. The use of an A + is, of course, a decision that can change your life in a professional, open the doors to countless opportunities.

A + A typical course includes various aspects ofComputing, security and network technologies, such as installation, configuration, updating and maintenance. A + certification training includes a simulated Quizzer often prepared with practice test questions for students to A + certification exam.

A + Education shall ensure that every computer technician understands and identifies the various methods for installing devices, choosing the right order, an example of a transceiver and modem, includingDial-up, cable, DSL and ISDN.

Additionally, CompTIA A + certification includes extensive testing of digital cameras, external storage, UPS () of continuous power, printer, oppressor, Monitors, PDA devices, infrared and wireless access points.

A + course will cover topics such as optimization of the operation of PCs in certain situations, using the knowledge gained from A + training for predicting certain procedures that occurs in someScenarios, such as installation of additional processors, cooling systems, memory, specialized graphics cards, network cards, disk subsystem or extensions.

A qualified computer technician, as well as certification training A +, always results in a position, regardless of the topic that needs to upgrade a PC capable of identifying components that need such an update, such as disk storage systems to determine, motherboards, BIOS, card, CUP, laptop or other sources of energy or the addition ofPCMCIA cards.

A + certification for technicians who enrolled in one assigned an A + or A + training course, it is in multimedia format for home study.

CompTIA A + certification is for diagnosis and troubleshooting, as well as for preventive maintenance, safety and environmental base. A + Certification Training teaches students about the different maintenance, which can be a real computer expert to runat regular intervals.

Otherwise, the implementation of preventive maintenance measures, and recommended products and procedures, and instructions for using them, companies can save hundreds of thousands of dollars for the mismanagement of the devices.

These maintenance actions may not liquid detergents and other harmful or abrasive materials to clean contacts and connections, such as non-static vacuum. A + Certification Training teaches them how to cleanVentilation, monitors, removable media, along with taking care of moisture and dust control for the hardware and the disk drive.

วันเสาร์ที่ 23 มกราคม พ.ศ. 2553

Computer Security Made Easy

As more people begin to use the Internet, both for communication, online banking, investment or shopping, the potential danger of hackers and malicious attackers increase. While some may simply be after information for phishing or identity for resale, others are more dangerous to use in seeking to launch computer attacks such as the infamous Denial of Service or other viruses or trojans to other unsuspecting targets. The following list contains some simple methods and inexpensiveTo protect your computer. While there are other ways to do this, after the ten steps below will help you start protecting your computer and your personal information.

1. Backing up files and stores them in a safe place, away from your computer

2. Often, patches and update your operating system, antivirus, web browser and Internet security to prevent hackers from exploiting weaknesses in software. You can run the Windows operating system quickly [http://www.windowsupdate.microsoft.com] using the update wizard. Updates to Microsoft Office can also be found at http://www.officeupdate.microsoft.com be

3. Install a good firewall. With two hardware and good software firewall, most viruses, worms, trojans, adware and malware programs are removed prior to any problems or damage. It is important that the firewall and regularly updated.

4. Configure your browser and email settings for the best> Security. Programs like ActiveX and Java are commonly used by hackers to plant malicious programs on your system. Cookies can also be used to monitor Internet browsing to build an online profile of you. A good way to overcome these problems is to configure your Internet browser to "high" security settings. At a minimum, configure the security settings to "high" for the Internet and "sites" medium confidence.

5. Automatically update your antivirus --Software and Internet Security Software. To be able to avoid the current versions on your computer, get the security is compromised.

6. Just run from e-mails from people they knew. And even then only if you know what you are openning. Often a hacker can use the compromised e-mail spam or worm to infect other people. Not enough to know the e-mail, but you need to recognize the plant.

7.Do not run unknown. EXE file. This is the most dangerous, to do something to contain the infection, they often wait for a script of Trojan horse to other computers.

8. Disable file extensions hidden. This allows you to identify, and all unknown files or programs that are running on your local computer. By default, Windows hides file extensions option, so you have to disable this option.

9. Disconnect the computer from the Internet and disable it ifuse. This prevents hackers from attacking your computer is not connected to a network.

10. Making a boot disk to a CD before the computer a hostile breach of security experience. To recover data and system operations after a successful attack on your computer.