2009年10月12日星期一

Time to throw all your security in one box?



Matocha Associates' IT shop found it's easier to manage two multi-purpose security appliances when you're only dealing with one vendor per box. Its firewall , VPN, intrusion detection and gateway antivirus tools sit in one appliance from SonicWALL. The Oakbrook Terrace, Ill.-based company uses another from Trend Micro for Web, e-mail and spam filtering, plus additional antivirus protection.


Keeping it to two large vendors means the company doesn't have to scramble to figure out what technology needs upgrading and which vendor needs to take care of it, IT director Jeffrey Jarzabek said. It's also more cost-efficient to keep the vendor count low.


Would Jarzabek ever consider cramming devices from several different vendors into one appliance? Not anytime soon.


"This would be like having a BMW with a Mercedes interior and Audi exterior," Jarzabek, whose firm specializes in architecture, engineering, general contracting and construction management, said in an e-mail interview. "It isn't going to happen because it's not cost effective and it isn't reliable. This is the solution: one appliance, one vendor; another appliance, another vendor."


If a new survey from New York-based research firm TheInfoPro Inc. is any indication, Jarzabek's skepticism is not universal. A majority of IT professionals the firm interviewed in March and April said they would like to have one appliance that incorporates the functions of multiple vendors. Regardless of how many vendors are in one box, the survey makes this much clear: More enterprise IT departments are thinking about using multi-faceted appliances than they were a year ago.


Related links


Mad as Hell Series: Appliances vs. theory of everything


Burton analyst: One vendor for everything a bad idea


Radicati 'suite' success in question


"Appliances are maturing and are getting easier to use," said Myron Kerstetter, senior vice president of TheInfoPro Inc. "The message of the survey is that because of this maturity, more people are considering acquiring an appliance than in the past."


TheInfoPro (TIP) interviewed 102 enterprise IT professionals across a variety of industries on behalf of San Jose, Calif.-based Secure Computing. The firm used enterprises that belong to its TIPNetwork as a primary source of contacts. Respondents were not told that Secure Computing was involved in the study. In many cases, Kerstetter said he spoke with people who don't have an appliance right now. But among them, he said, "There seems to be a strong interest."


Among the findings:


Almost 50% of respondents indicated "more" or "much more" interest in multi-function security appliances compared to a year ago.


A majority of respondents -- 55% -- said they'd prefer that functions on a single security appliance be from more than one vendor. Another 31% prefer that all functions come from one vendor while another 14% were neutral.


More than 60% voiced some or serious consideration about using a security appliance for multiple security functions; another 10% already do or plan to.


More than 70% rated a single management interface, integrated reports and lower costs as somewhat or very important factors in a security appliance.


Most were not concerned about using fewer security vendors. Just over a third said it is somewhat or very important to use fewer.


A "very large majority" of enterprises use more than a single vendor of information security products. Forty-two percent use six to 10 vendors; 40% use five vendors or less.


Less than 20% had definite plans to decrease the number of security vendors they use; another 15% said they might decrease their number.




Having that many vendors is not beneficial to the bottom line… How is the management of them going? Not good? I didn't think so!


Jeffrey Jarzabek


IT Director, Matocha Associates




Noting that 42% of respondents said they use six or more vendors and that 66% said they won't reduce the number of vendors they how have, Jarzabek said, "Having that many vendors is not beneficial to the bottom line… How is the management of them going? Not good? I didn't think so!"


Skeptics of all-in-one appliances have argued the machines aren't as simple as they appear on the outside. What's an IT practitioner to do when a glitch crops up in such an all-encompassing machine? Critics say it's much more difficult to address the problem when the affected software is buried in the belly of a big appliance.


But Kerstetter said that concern appears to be easing. One analogy is that in the old days, an IT administrator would need a hard hat and screwdriver to fix something run amuck within an appliance. Now, Kerstetter said, "Technology has matured and fixing a problem is as easy as pressing a button and rebooting."


Paul DeBernarbi, director of product marketing for Secure Computing , agreed. "The technology has caught up with demand," he said. "Today's hardware and software is such that you can have one platform that can deliver on multiple needs."




Technorati : ,

Del.icio.us : ,

Zooomr : ,

Flickr : ,

2009年10月11日星期日

McAfee sued for patent infringement

Antivirus vendor McAfee Inc . is being sued by Dallas-based security firm DeepNines Inc. because of alleged patent infringement and false product marking.


DeepNines said it was issued U.S. patent number 7,058,976 in June for its Security Edge Platform (SEP), a unified threat management product that integrates firewall, behavior- and signature-based intrusion detection (IDS) and prevention (IPS), antivirus and traffic management into a single device.


But, DeepNines claims, Santa Clara, Calif.-based McAfee has been marking and selling about nine separate products that claim the patent as its own, including McAfee IntruShield and Total Protection, which the vendor released in April to much fanfare.


As a result, DeepNines is seeking damages and a permanent injunction to prevent McAfee from marketing and selling the infringing products, company president Dan Jackson said in a phone interview Thursday morning. Law firm Fish & Richardson P.C. is representing DeepNines, and the lawsuit has been filed in United States District Court in the Eastern District of Texas.


"We intend to protect our intellectual property, just as we respect the intellectual property rights of others" he said. "Although DeepNines continuously monitors the products of its competitors, at this point, our focus remains on McAfee for both infringing our patent and falsely marking its products with a patent that is invalid and purports to claim the same invention covered by our patent."


Jackson would not specify what damages his company is seeking. DeepNines was founded in 1999 and claims to have more than 200 product installations across industries such as financial services, education, energy and government.


McAfee spokesperson Siobhan MacDermott declined to offer a detailed response about the lawsuit because she had not yet seen a copy of the full document. She did note that McAfee has its own lawsuit pending against DeepNines, but she couldn't offer details about that lawsuit, other than that it was filed in January.




Technorati : , , ,

Del.icio.us : , , ,

Zooomr : , , ,

Flickr : , , ,

2009年9月24日星期四

Spam, encryption to drive security spending

New ways of tackling spam and a general need for better overall IT security are pushing a growth in spending for security products, according to one market research firm.


In a new study, The Radicati Group Inc., of Palo Alto, Calif., said security products are now at the top of the list for IT spending, while spending for other technologies is still somewhat sluggish. The study said total revenue from enterprise security products will grow from $2.9 billion in 2004 to $6.6 billion in 2008 -- an average rate of 24% each year.


"It's a market that has picked up steam," said Sara Radicati, the company's president and CEO. "In the past we had predicted 10% to 15% growth."


One of the trends cited by the study is the move away from products that do one task and toward software suites that tackle a whole range of security problems. Revenue for such security software suites is expected to jump from $185 million in 2004 to $492 million in 2008, the research firm said.


Clearswift Ltd.'s Mimesweeper, Tumbleweed Communications Corp.'s Mailgate and CipherTrust Inc.'s Ironmail are all examples of products that combine various technologies such as firewalls and antivirus and antispam software , Radicati said.


The all-in-one product segment has an advantage in that it is more convenient and can be less costly to operate. "It simplifies the overall management infrastructure and they are easier to install," she said. "The downside is they may be less specialized than a point [product]. Point [products] will always be a tad ahead."


Antispam software is experiencing steady growth, too. Revenues are expected to increase from $979 million in 2004 to $1.7 billion in 2008 -- an average rate increase of 16% over four years.


Antispam technology in general is experiencing an evolution. Microsoft is making some moves in this regard with the planned release of Sender ID technology built into Exchange Edge Services, which is due out in 2005. Sender ID, a draft specification that is currently before the Internet Engineering Task Force, is designed to help reduce the problem of domain spoofing and protect against phishing schemes.


"Everyone is realizing that the real issue isn't just spam but the integrity of Internet communications," Radicati said.




Technorati : , , , ,

Del.icio.us : , , , ,

Zooomr : , , , ,

Flickr : , , , ,

2009年9月23日星期三

Antivirus researcher Gullotto leaves Symantec for Microsoft

Microsoft has hired one of the industry's top antivirus researchers to run its nascent antivirus research and response team.


Vinny Gullotto, who had been at Symantec Corp. since earlier this year, started work at Microsoft this week. His charge at Microsoft will be to help the software giant get its virus response team up to speed with those run by the major antivirus vendors.


Gullotto will be the general manager of Security Research and Response, a separate unit from the Microsoft Security Response Center (MSRC); both teams fall under Microsoft's Security Technology Unit.


Gullotto has more than a decade of experience in the antivirus industry , and has been well-traveled as of late. Until late 2005, he was the vice president of McAfee Inc.'s Anti-Virus Emergency Response Team (AVERT). He left McAfee to join Cupertino, Calif.-based Symantec this past spring and helped run its well-known Symantec Security Response unit.


He is one of a handful of virus researchers, including David Perry at Trend Micro Inc., Vincent Weafer at Symantec and Nick FitzGerald of Computer Virus Consulting, who have been at the forefront of antivirus research during the last decade.


Microsoft's hiring of Gullotto is yet another sign of how seriously the Redmond, Wash.-based vendor is taking its move into the antivirus market. It launched its Windows Live OneCare antivirus and antispyware suite in May and will include those protections in Windows Vista, due for release this fall. This move has ruffled a lot of feathers among the antivirus vendor community, most of whom have been Microsoft partners for years. Hiring Gullotto away from Symantec is unlikely to smooth any of those bad feelings.


Symantec declined to comment on Gullotto's departure.


Gullotto is not the only high-profile security researcher that Microsoft has hired lately. Adam Shostack, a well-known security and privacy expert and author who worked at pioneering privacy-software developer Zero-Knowledge Systems, joined Microsoft in June and is working on the Security Development Lifecycle, a set of software design theories designed to help developers build software that can withstand attacks.


Microsoft for several years has used the MSRC to work with antivirus vendors , customers and industry organizations during virus and worm outbreaks. But now that Microsoft has its own antivirus offering, the company apparently has decided it is time to start a dedicated in-house virus response team.


"Microsoft is very excited that Vincent Gullotto will be joining Microsoft as the general manager of Security Research and Response and we look forward to working with him in his new role," a Microsoft spokesman said in an emailed statement.




Technorati : ,

Del.icio.us : ,

Zooomr : ,

Flickr : ,

2009年9月21日星期一

Symantec to release security software that protects consumers during online transactions

A new security program should prevent personal data leaks when consumers are conducting online transactions, protecting valuable financial information .


Some features of Symantec's Norton Confidential include the ability to detect and remove malware, which Symantic refers to as "crimeware," such as keylogging programs that can steal credit card numbers, login names and passwords. During a secure purchase made with a credit card, Confidential will block any program that is trying to access the keyboard and monitor display.


Other features include an electronic wallet that can store credit card and online purchase information in an encrypted file, which will allow consumers to auto-fill transaction forms and keep their data in a secure place on their PC. It will also store a safe list of SSL certificates used by a few e-commerce sites and high-traffic banks. This means Confidential will not only alert users to sites that are unsecured, but it will be able to confirm that the site they are visiting is genuine, thereby helping combat pharming sites.


Not only will Confidential be able to eliminate the malware that it has been programmed to recognize, but it will also be able to recognize other malware using new behavioral technology from WholeSecurity, which Symantec obtained last year.


"[WholeSecurity software] is a complement to Symantec's antivirus software , and it's also the first Symantec product to work with other antivirus products from other vendors," Symantec product manager Olivia Schmelzle said.


Norton Confidential is set to beta test in July and go on sale in October




Technorati : ,

Del.icio.us : ,

Zooomr : ,

Flickr : ,

2009年9月18日星期五

BT presses the accelerator for broadband speed

BT offers millions of customers the chance to boost their broadband speed for free with the launch of faster headline speeds of up to 20Mb/s and the BT Broadband Accelerator .




BT Retail broadband customers already enjoy download speeds of up to 8Mb/s, but in enabled areas that will leap to up to 20Mb/s to deliver consistently faster broadband all day and night even at peak times. Upload speeds will also increase from up to 448Kb/s to up to 1Mb.




Unlike other broadband providers, BT Retail is offering the faster speeds at no extra cost. The cheapest broadband option is just £7.78 a month for the first three months.




Faster speeds will initially be available through 549 exchanges serving 10 million - or 40 per cent - of the UK's homes and businesses. Coverage will increase to 55 per cent by March 2010.




The BT Broadband Accelerator - a speed booster pack worth £15 - will be free for BT Total Broadband customers who order it online, with postage of just £1.20. The BT Broadband Accelerator includes a small plate that customers, who have more than one phone socket, can easily insert into their main telephone socket to reduce the impact of electrical interference; this may increase broadband speed by 1.5Mb. It also comes with an easy self-install guide as well as a comprehensive 10-step guide on how to optimise broadband speeds and will help customers get the most out of their broadband connection.




BT research shows that one of the main causes of slow broadband is customers' home wiring. The BT Broadband Accelerator plate, also known as the I-Plate, isolates a redundant wire in the socket which can slow connections. Although speed improvements are likely, they cannot be guaranteed. Even if it does not improve speed the device can help stabilise broadband lines making them even more reliable.




John Petter, managing director of BT's Consumer division, said: "The BT Broadband Accelerator can make a big difference to the speed of your broadband. We think it is so important we've taken the decision to offer it to our customers for just the cost of the postage.




"Between that and us more than doubling headline speeds for millions of homes and businesses, most customers should start to see a rapid boost in the performance of their connection. We have a track record of not charging customers any more when we increase the speed and this time is no different. BT broadband customers won't have to pay any more to get higher speeds.




"These two moves demonstrate our commitment to helping the UK move closer to the kind of widely-available speeds published in the Digital Britain report."


ADSL2+ - BT Consumer




New customers or re-contracting BT Total Broadband customers in an enabled exchange area will automatically be eligible for up to 20Mb/s broadband service from as little as £7.78 per month. Customers will be able to order or simply find out when they can get up to 20Mb/s and what speed they can expect via BT.com. Existing customers will be asked to sign a new contract.




The BT Broadband Accelerator will be offered free to BT Total broadband customers who order it online.


ADSL2+ - BT Business




New or re-contracting BT Business Broadband customer in an enabled exchange area will automatically be eligible for the up to 20Mb/s service. Orders can be placed by customers direct online, or via any offline business sales channel. Customers will not pay any more for the new service, which offers up to 20Mb/s downstream speeds. The upstream (customer to exchange) line speed will improve to 1Mb/s.




The BT Business Total Broadband tariff also remains the same and includes BT Openzone Wi-Fi minutes. BT Business Option 3 customers also receive free mobile broadband and other business services worth over £750. BT Business Total Broadband is available from £12.50 (ex VAT) per month including 24/7 UK freephone business support. Businesses also have the flexibility to build their own communications package by bundling their broadband with calls to UK landlines, mobiles and international numbers from only £27.50.




The BT Broadband Accelerator will be offered free to customers in instances where BT believes performance can be improved.




Technorati : , , , , ,

Del.icio.us : , , , , ,

Zooomr : , , , , ,

Flickr : , , , , ,

2009年9月16日星期三

How to Back Up Your Data-the Options

Backing Up Your Business Data or Personal Files is an Essential Part of the Modern Day Workflow


Backing up your business data or personal files is an essential part of the modern day workflow. There are choices on how you can best store your information, from data back up services online to the traditional cd or DVD burning solution. Data back up systems can also be employed in the form of external hard drives.


External Hard drives.


When choosing this option, there is a need to avoid cheap external hard drives.


The best way to go with external hard drives is to do the necessary research and find out what are the top 10 external hard drives. It is advisable to go with a reputed name like Seagate or Western Digital for reliability. For your most valuable data, I would suggest burning DVD or copies as a stable data backup solution. The reason for this is DVD's are very reliable if taken care of. If you are not too worried about the sensitivity of your information, then you might consider a data backup company. There such services if one Googles "backup online".


USB Flash Drives


The chief limitation of using a USB flash drive is the amount of storage you get. Unless you are backing up small files such as Spreadsheets and Word files, the USB flash disk will not be too much use for backing up your movie collection. USB Flash Drives have grown in capacity over the years, now carrying up to 16GB (from the paltry 250 MB of yesteryear.) One might want to consider researching the best 64gb USB flash drives.


The major fall back on USB flash drives is loss of the device due to its size. This is however counter-balanced by its portability.


Recovery of data.


It is always a good idea to invest in backup disaster recovery software . This usually enables a personal recovery solution if you lose your data but your drives are not damaged. For a price you could get a very good backup and recovery system installed onto your computer. This facilitates the whole process of data back up.


Considering the fact that information files are getting larger and larger. From movies and bought online (iTunes for instance). To personal projects such as home videos. There is a need to consider how you would want to back up your data. All systems of backing up have their own hang ups (External hard drives may fail, DVD's and CD's may become scratched etc), therefore choice of what system to use will greatly depend on what value you put on your data.




Technorati : , , , ,

Del.icio.us : , , , ,

Zooomr : , , , ,

Flickr : , , , ,

Useful Instructions for Ghost 14

Norton Ghost 14 from Symantec is a software program that allows you to back up your computer drives, folders and files. With Ghost, you can establish a backup process to make copies of anything you want on the computer in case something important gets damaged or lost. Ghost 14 supports works with Windows Vista or XP Service Pack 2.


Installation




Ghost 14 requires 250 to 300 megabytes of hard-disk space. You need 256 megabytes of RAM for Ghost Agent and the user interface and 512 megabytes for Symantec Recovery Disk. You must be logged onto your computer with an administrator account to install the program. Load the installation CD. Once the browser panel appears, click on "Install Norton Ghost ." Be sure to check on the box accepting the terms of the license agreement, then click "Install Now." You can select "Custom Install" and select which programs you want installed--options are User Interface, Backup and Recovery Service, CD/DVD Support, Recovery Point Browser and LiveUpdate. Click "Finish" to complete the installation. You must restart the computer before you can run Ghost. To start the program after installation, click on the Norton Ghost icon in the system tray or go to Start/Programs/Norton Ghost in the taskbar.




Backing Up Drives




To define a drive backup, click on "Run or Manage Backups" on the Ghost Home page, click on "Define New" and select " Back up my computer ." Select the drives you want backed up, then choose "Define a new backup" or "Add drives to an existing backup." Select the type of recovery point the backup will create--a set or independent point. Go to the Backup Destination page and choose a folder field location or a network share to store the recovery points. You can also rename the recovery points and choose two off-site locations where you want to to copy the points. In the Options page, you can give a name for your backup, choose its compression level and test if the the files/recovery points are corrupt. Select whether you want the backup to run at a scheduled time period--you need to customize this if you chose an independent recovery point. You can choose to run the new backup immediately by selecting "Run Backup Now." Otherwise, click "Finish."




Backing Up Folders/Files




Go to "Run or Manage Backups" in the Home page, click on "Define New" and select " Back up selected files and folders." Select the files and folders you want backed up. Type in a name for the backup in the Name box and a description in the Description box. Use the "Browse" button to find a location for the backup. On the Advanced page, you can add a password or encryption and remove folders from the backup. If you want the backup to run on a schedule, click "Schedule" and select the dates for the backup to run. You can now choose "Run backup now" or end with "Finish."


Restoring From a Backup




To recover a file or folder, select "Recover My Files." In the left pane of the window that appears, select "File and Folder" and search for the specific item by typing its name into the search box. Select the items you want, click " Recover Files " and choose to restore them to their original folders or to save the recovered files to another folder. To recover a drive, click on "Recover My Computer" from the Tasks page, select a recovery point and click "Recover Now." You can simply click "Next" to recover the drive, or you can customize the recovery by selecting "Custom." You can now check for system errors, verify if a recovery point is valid, restore the original disk signature and assign a drive letter to the partition.




Technorati : , , ,

Del.icio.us : , , ,

Zooomr : , , ,

Flickr : , , ,

2009年9月14日星期一

Key Member of Original Norton AntiVirus Software Team Brian YoderJoins CyberDefender as Vice President Engineering

LOS ANGELES--(Business Wire)



CyberDefender Corporation (OTCBB: CYDE), an award-winning provider of PC security , Antispyware/ Antivirus Sof tware , PC Optimization, PC Support, and Identity Theft Prevention solutions, announced today the appointment to the position of Vice President Engineering of Mr. Brian Yoder, a software developer since the late 1970`s, and an early member of the Peter Norton Computing/Symantec (SYMC) team.




Mr. Gary Guseinov, CEO and Chairman of the Board of CyberDefender, commented,"As we continue to invest in accelerated growth, I`m extremely pleased we have been able to attract Brian to our senior management team. He is an expert in Internet security software , having been a key contributor and early member of the teams that initiated the original Norton AntiVirus product and developed all of the classic Norton applications. In addition, he has been a successful entrepreneur with startups in areas ranging from software development tools to video games and automatic language translation systems. In these roles, he also has been a successful recruiter over the years of top talent and has managed engineering teams with up to 130 participants."




Mr. Yoder stated, "I`m a fan of CyberDefender and the products they have produced based on their early NETWORK technology. Going forward, I believe my long experience building mass market commercial applications spanning many technology platforms such as Windows, Unix, Macintosh and mobile devices, can be instrumental in extending CyberDefender`s customer reach into these areas."



In addition to his commercial activities and successes, Mr. Yoder is a founder of the Art Renewal Center, an art education foundation which provides scholarships for students, manages the world`s largest online painting gallery and also operates the prestigious ARC Salon Contest.




About CyberDefender Corporation




CyberDefender Corporation, based in Los Angeles, believes that its Internet security technology offers the earliest possible detection and most aggressive defense against Internet security attacks. CyberDefender uses a patent pending secure peer-to-peer collaborative threat protection network (the earlyNETWORK), to combat spyware, viruses and identity theft. Products employing the


earlyNETWORK include CyberDefender Early Detection Center and MyIdentityDefender. CyberDefender also offers PC optimization utilities and Live Premium Technical Support services. CyberDefender products are fully compatible with Microsoft's Vista Operating system and available at http://www.cyberdefender.com. To date, more than 15 million consumers have used



CyberDefender products.




Forward Looking Statements



Statements in this press release that are not statements of historical or current fact, such as CyberDefender's expectation of future revenue growth and profitability, constitute "forward-looking statements". Such forward-looking statements involve known and unknown risks, uncertainties and other unknown factors that could cause CyberDefender's actual results to be materially different from the historical results or from any future results expressed or implied by such forward-looking statements. Factors that could cause CyberDefender's results to be materially different from the forward-looking statements include whether CyberDefender will be able to find financing when and as it needs it and whether CyberDefender's revenues will eventually exceed its expenses. The forward-looking statements contained herein are also subject





Technorati : ,

Del.icio.us : ,

Zooomr : ,

Flickr : ,

2009年9月13日星期日

Install a Scanner Into Photoshop CS3

Properly speaking, scanners are not installed in Photoshop CS3 ; they are instead installed on your computer. You can then designate Photoshop CS3 as the external editor or viewer for your scanner, or, from Photoshop, you can import images through that scanner. For either of these options to work, the scanner must be properly installed on your computer.


Check if you already have a scanner correctly installed on your computer. (If you have previously installed a scanner on your computer, it may be ready to go in Photoshop CS3 .) To check, open Photoshop and go to "File > Import." A menu should pop up to the right. If your scanner is listed, either preceded or followed by "TWAIN" or "WIA," proceed to Step 4. If not, check to see that the scanner is properly connected; then restart Photoshop. If it's still not listed in under the "File > Import" menu, go to Step 2.


Check if your scanner is properly installed. (If your scanner doesn't show up in Photoshop, it may not be properly installed.) If you are using a PC, go to the "Control Panel > Hardware > Scanners and Cameras." If you do not see your scanner there, use the installation software that came with your scanner to install the scanner. You will need to restart Photoshop CS3 for the program to recognize the new scanner.


Make sure your scanner's driver software is up to date (if your scanner is listed under "Scanners and Cameras"). Go to "Control Panel > Hardware and Sound > Device Manager" and click on "Imaging Devices." Right-click on your scanner and select "Update Driver Software." Search online for the updated driver software. A restart may be required.


Your scanner should now be properly installed with current drivers and ready for use to acquire images for Photoshop.


Import an image using TWAIN, which is a standard software protocol that connects software applications and imaging devices (such as Photoshop and your scanner), by simply going to "File > Import" and click on the "TWAIN" option. Follow the instructions on that screen to scan your image.


Import an image using WIA (Windows Image Acquisition), according to Adobe Photoshop help, by choosing "File > Import > WIA Support." Select a destination on your computer for saving your image files. Click "Start." Select your scanner. Choose the kind of image you want to scan. Click "Preview" to view the scan. Crop if necessary. Click "Scan." The scanned image is saved in BMP format.




Technorati : , , , , ,

Del.icio.us : , , , , ,

Zooomr : , , , , ,

Flickr : , , , , ,

2009年9月11日星期五

How to Prevent an email virus

Many times a virus can be taken care of with some simple steps to prevent the computer from becoming infected. An email virus can cause people in your address book to become victims too


Step 1


Go to the computer and engage to your IPS (Internet provider service). You are now online to activate all computer skills you will need to prevent an email virus from attacking your personal address book.


Step 2


You are going to add a fictitious email address to your address book, so you prevent becoming infected with an email virus . You are doing this to protect yourself and everyone in your address book. Press the add on icon to complete this task. Insert Aaaaaaaaa Aaaaaaaaa or any other series or any number of the letter a. use the capital "A" for the first letter and the capital "A" for the first letter of the second bunch of the letter a in both groups. Now you have your name inserted into your contact list with these 2 groups of the letter a.


Step 3


Insert this fictitious name into your contacts. View to make sure it is the first name in your address book in your computer. You can also do this for your laptop computer at home or work too. Click the add button making it official that you are adding Aaaaaaaa Aaaaaaaa.


Step 4


Next add a fictitious email address using appropriate configuration such as aaaaaaaa.aaaaaaaa@someserver.com. You can make up any server except the ones you know exist. All the other personal information can be left blank since this is all you will need to prevent you and all your contacts from an email virus.


Step 5


If a hacker or some unknown tries to enter your computer address book, they will begin with the first person in your address book and fail.




Technorati : ,

Del.icio.us : ,

Zooomr : ,

Flickr : ,

2009年9月8日星期二

How to Download Free Anti Spyware

Windows Defender


Find Windows Defender. This anti-spyware program not only offers protection from spyware, it also has a popup blocker and has a simple setup to allow you to schedule your maintenance.


Download Windows Defender. Locate their web page. Once you are there, you will see a big banner that says, "Get It Now". Click on that and it will take you to another page.


Click on "Continue". The Microsoft website will automatically scan your computer for a legitimate copy of windows. Once you pass this test you will be taken to the download page.


Spybot Search & Destroy


Step 1 Locate Spybot Search & Destroy. This free anti spyware program is designed to remove spyware, run in the background so you are always protected and, if you share your PC, it can cover your tracks so others cannot see what you have been doing.


Step 2 Download Spybot Search & Destroy. Go to their website and click on your language of choice. This will take you to another page with news and information about the free program. On the left-hand side of the screen are a few options. Click "Download". You will see a few programs that you will want to obtain.


Step 3 Click on "Spybot - Search & Destroy 1.6.0" to download the program first. Choose any location you wish to download from. Then click "Download Now". Your file will begin downloading right away. Use the same steps to download the update files.


Trend Micro HouseCall




Step 1 Find Trend Micro HouseCall. This is an online scanner that not only is a built-in anti-spyware program but also checks your computer for viruses and adware.


Step 2 Go to the Trend Micro HouseCall website. Click on "Scan Now. It's Free!". When the new window pops up, click on "Launch HouseCall Free Scan".


Step 3 Choose a Java platform or download special files to your computer. Each method is fine, and you do not need to worry about downloading their plug-ins. At this time, HouseCall is only supported by Firefox and Internet Explorer.




Technorati : , , ,

Del.icio.us : , , ,

Zooomr : , , ,

Flickr : , , ,

2009年9月7日星期一

Ways to Find Free DVD Burning Software

DVD burning software is essential for anyone who wants to transfer movies or video off a computer and on to a writable DVD disk. The information below will provide you with the steps necessary to find free DVD burning software .


Getting Started




Starting out you will need to be sure that you have your virus protection program running. It is possible for your download to contain a virus or malware, protect yourself from this happening by using a trusted and reliable anti-virus program when making your download.


Freeware


Go online and search for DVD burning freeware . Freeware is free full versions of software that is available for download online. There are many such versions of DVD burning software online. Upon finding the program you want, simply download just as you would any other software.


Free Demo Versions


Access your web browser and conduct a search for free demo versions of DVD burning software . For your convenience I have included a few sites that offer free demo versions of such software. Most demos have time limits on how many days you can use them. These limits are usually capped at about 2-4 weeks of usage. Consider trying a few different demos to see which ones work best for you.


Ask Around


If you know someone who has a DVD burner, chances are they have DVD burning software to go along with it. Ask anyone in your family or circle of friends if you can borrow their DVD burning software .




Technorati : , , ,

Del.icio.us : , , ,

Zooomr : , , ,

Flickr : , , ,

2009年9月6日星期日

Quickly Re-Touch Photos With PicTreat

Even with their fancy features, digital cameras aren't immune from taking the odd bad picture. Now what happens when you want to fix a photo (like red eye, pimples, bad lighting) and free online photo editing sites just aren't cutting it with their basic features? Sure you could always use Photoshop if you're a master of its many tools, but what if you need to change your Facebook profile photo right away, and you don't have Photoshop? A site called PicTreat will instantly enhance your photo for free, and you can even sign-in using your MySpace ID or Facebook Connect.



Found a useful website you'd like to share? To learn how to post your favorite websites to our Website of the Day group, read more.




Technorati : , , , ,

Del.icio.us : , , , ,

Zooomr : , , , ,

Flickr : , , , ,

2009年9月3日星期四

Microsoft Windows AntiSpyware: MS Escalates the Fight Against Malware

Redmond Joins Fight Against Spyware


When it comes to fighting spyware, even Bill Gates would rather buy it than build it.


In December 2004 Microsoft purchased the anti-spyware technology created by GIANT Company Software, and by the first week in January it had released a beta version of Microsoft Windows AntiSpyware, well ahead of its expected 2006 delivery date.


Microsoft Windows AntiSpyware


Microsoft's entry into the spyware arena comes not a moment too soon. A November 2004 study by research firm IDC estimates that 67 percent of consumer PCs are infected with some form of spyware. "Spyware" refers to any software that is covertly placed on a PC and that secretly gathers user information without the user's knowledge, typically for advertising purposes.


Beyond being a privacy threat, spyware can be a real nuisance, spawning pop-up windows not just when the user is online but even when the PC is not linked to the internet. A number of other notable players already have staked out their claims in the marketplace, including Ad-Aware and Spybot Search & Destroy. As usual, Microsoft's entry into the arena ups the ante considerably.


The beta version of Microsoft's anti-spyware offering essentially repackages the same set of tools offered by GIANT, tools that already have proven their efficacy on this complicated battlefield. The beta works on Windows 2000, Windows XP, and Windows Server 2003.


The beta program detects existing spyware through a rapid scan of a PC's files and memory. A scanning scheduler sets regular times for full scans, while an online spyware library contains information about the spyware that is detected. The anti-spyware program also keeps tabs on the impact of spyware, with reports that alert the user as to applications that are running, current Internet Explorer settings (which can be altered by spyware), and unwanted networking activity that may be linking the PC to unwanted internet destinations.




Technorati : ,

Del.icio.us : ,

Zooomr : ,

Flickr : ,

2009年9月2日星期三

Top anti-spyware software

KOLKATA: In June, Praveen Rai in Mumbai saw his coffers swell by Rs 90,000 while Akhilesh Bagla a Kolkata businessman sat baffled as the same amount


exited his bank account overnight. Though Bagla had done nothing apart from some e-banking, Rai sitting on India's other coast had successfully hacked into the businessman's account, to commit possibly the first e-fraud in the city.


Although the rise in online presence and transactions pose a potential risk to users, there are ways to safeguard your identity and information on the internet, ethical hacker and cyber security expert Ankit Fadia explained in the city on Friday.


"There are solutions that can substantially reduce the risk. Installing a firewall for your personal computer, as well as installing a good anti-virus and anti-spyware can provide significant protection," Fadia said. He was speaking at a seminar at the Heritage Institute of Technology.


"It is a misconception that firewalls are only for corporate use. Using them on your personal computer can mean that criminals have a harder time trying to access your personal information," he revealed, while adding that regular updates for operating systems, anti-virus and anti-spyware softwares were essential.


Fadia also recommended the use of strong individual passwords for each website or online service by using a combination of alphabets, numbers and special characters. "It's not good having your name followed by your birthday as a password for protecting vital information. You should also instal and use a key scrambler, so that your typing patterns cannot be copied or tracked," he said.


On the cyber terrorism front, Fadia who had worked with international intelligence agencies in the aftermath of 9/11 said terror organisations were now improvising email accounts to exchange information.


"Terrorists can sign into a single email account from different parts of the world and save their messages in the draft form, which the others can then access. As the email never leaves the server, it becomes increasingly difficult for security agencies to track these conversations," he said.




Technorati : , , , ,

Del.icio.us : , , , ,

Zooomr : , , , ,

Flickr : , , , ,

2009年9月1日星期二

How to Back up Your iPod — Without iTunes

Buzz up!0 votes Your precious iPod-your friend, your status symbol, your companion during good times and bad. It comes with you wherever you go; until one day, it disappears without a trace. Here's a cautionary tale, plus some tips on how to preserve your tunes if this nightmare scenario happens to you.


For me, there's no better time for cranking my iPod than while cruising at 35,000 feet; nothing whiles away the hours faster than dialing up a few podcasts or the odd TV show. But what if you leave your ice-white buddy on the plane? Not good. Unfortunately, it just happened to Shiny Shiny editor Susi Weaser, who had about 3,000 tracks on her iPod that weren't saved on her PC and now faces the task of rebuilding her extensive music collection from scratch. Ouch.


The moral of the story, of course, is to back up your iPod . Now, most of us essentially do just that every time we sync our iPods using iTunes , but if you're a power user like Weaser and you have untold thousands of songs on your iPod from multiple sources, the standard iTunes sync won't cut it. Luckily, The Gadgets Page has compiled a thorough list of iPod backup utilities that promise to keep your music safe and sound. Even better, these apps can transfer songs from your iPod back to your PC if, say, the hard drive on your system suffers a meltdown (which happened to me last year).


Just remember that these backup programs aren't sanctioned by Apple, and that using them to rip songs from your buddy's iPod to your PC or Mac is, of course, a no-no.




Technorati : , , , ,

Del.icio.us : , , , ,

Zooomr : , , , ,

Flickr : , , , ,

2009年8月31日星期一

Basic Knowledge of Download Manager

A download manager is a computer program dedicated to the task of downloading (and sometimes uploading) possibly unrelated stand-alone files from (and sometimes to) the Internet for storage. This is unlike a World Wide Web browser, which is mainly intended to browse web pages, composed of a multitude of smaller files, where error-free moving of files for permanent storage is of secondary importance. (A failed or incomplete web page file rarely ruins the page.) The typical download manager at a minimum provides means to recover from errors without losing the work already completed, and can optionally split the file to be downloaded (or uploaded) into 2 or more segments, which are then moved in parallel, potentially making the process faster within the limits of the available bandwidth. (A few servers are known to block moving files in parallel segments, on the principle that server capacity should be shared equally by all users.) Multi-source is the name given to files that are downloaded in parallel.


Download managers commonly include one or more of the following features:


Pausing the downloading of large files.


Resuming broken or paused downloads (especially for very large files).


Downloading files on poor connections.


Downloading several files from a site automatically according to simple rules (file types, updated files, etc. - see also Offline Browser).


Automatic recursive downloads (mirroring).


Scheduled downloads (including, automatic hang-up and shutdown).


Searching for mirror sites, and the handling of different connections to download the same file more quickly (segmented downloading).


Variable bandwidth usage.


Automatic subfolder generation.


Download managers are useful for very active Internet users. For dial-up users, they can automatically dial the Internet Service Provider at night, when rates or tariffs are usually much lower, download the specified files, and hang-up. They can record which links the user clicks on during the day, and queue these files for later download. For broadband users, download managers can help download very large files by resuming broken downloads, by limiting the bandwidth used, so that other internet activities are not affected (slowed) and the server is not overloaded, or by automatically navigating a site and downloading pre-specified content (photo galleries, MP3 collections, etc.) this can also include automatically downloading whole sites and regularly updating them (see Mirroring).


Many download managers support Metalink, an XML file listing mirrors, checksums, and other information useful for downloading.




Technorati : , , , , ,

Del.icio.us : , , , , ,

Zooomr : , , , , ,

Flickr : , , , , ,

2009年8月30日星期日

Accelerator Adds Anti-Virus and Anti-Spyware

Contrary to claims we published in July (see SlipStream Data Touts Success), the dialup acceleration industry remains as competitive and cutthroat as ever.


Most reviews, such as this one in PC World, have found that the various competitors' offerings each have their own strengths and weaknesses (the PC World review found Proxyconn had the best cache and therefore the best speed on previously visited sites, Propel the best speed on new sites, and Artera's product the easiest to use but least effective).


When we spoke with Uzi Yair, CEO of Newport Beach, Calif.-based Proxyconn, he, too claimed to be number one in this space. Usually, you would look to an industry analyst for data, but despite the continued resiliency of dialup, the analysts at the major firms seem to be more interested in broadband-and in services like IPTV which have barely hit the market-so there is no publicly available data on market share. Artera, Propel, and SlipStream all have confirmed booths at ISPCON.


Proxyconn's latest improvement to its service is the addition of anti-virus from Palm Beach Gardens, Fla.-based Authentium. Yair says the company will sell the anti-virus through channel partners at a price of $1 per user per month, expecting ISPs to charge end users $2 per user per month. The product may also be offered at retail at a higher price, perhaps $29.95. "We have to be competitive with McAfee and Norton," Yair says.


He notes that ISPs seem particularly pleased with the ability to own brand the Proxyconn anti-virus offering . He adds, "ISPs can sell our anti-virus as part of the accelerator suite or as a stand alone product. They don't have to use our accelerator if they don't want to."


Partial test


Yair was so enthusiastic about the software that he offered us a test drive. Unfortunately, we have a corporate computer and we did not have a dialup connection to test it on. The cache did not speed up our Internet connection. The anti-virus did not find any viruses our corporate Symantec product had missed. And the accelerator crashed because our corporate connection doesn't allow proxy servers, which are so essential to the product that they're part of its name. The product served a single ad after it was first installed. All of the above shows why we do not test software at ISP-Planet.


The one element of the software that we were able to test is the GUI. The interface was very easy to use and to understand. When Yair says that it will reduce support calls, we believe him. We also, of course, tested uninstall, and that feature was flawless.


At ISP-Planet, we believe that any ISP offering dialup should also offer acceleration, and that every ISP should test the various available products from Artera Turbo, Propel, QuikCAT, Bytemobile, ICT, Proxyconn, and Slipstream Data. Each has strengths and weaknesses.


Yair says Proxyconn is closing deals with 3 or 4 ISPs each week. He admits competition is tough. "It's good for end users, and it puts pressure on margins. ISPs benefit from the opportunity to provide better service and increase their revenue."


The edge of the USA


We spoke with Tim McAfee (no relation to the anti-virus vendor ), general manager (as in "engineer") of Houlton, Maine-based Pioneer Wireless Network (network map here).


The company is situated on the Canadian border, with weather to match. "We've got two seasons here," says McAfee, "the season with snow and the season without."


The company has been adding services for residential customers. The standard residential package is 768 Kbps down, 128 Kbps up for $34.95.


"We had customers asking for software like EarthLink gives their customers," he explains. "We said we could not hire a developer and build software in house, but we started looking for options."


The company provides AppRiver anti-spam as part of its packages. It uses open source (GNU public licensed) software for filtering: DANS Guardian with the Squid proxy server.


Recently, it selected Proxyconn for the accelerator and anti-virus. Ease of installation-and getting three pieces of software in one package (anti-virus, anti-spyware, and accelerator)-were key considerations. The company also looked at Propel.


With all the software in place, the company expects to be able to charge $5 per month for Proxyconn, and to reduce support calls. "About 35 percent of support calls are related to spyware and viruses," says McAfee. He feels Proxyconn can help.






Technorati : , , , ,

Del.icio.us : , , , ,

Zooomr : , , , ,

Flickr : , , , ,