• How to protect your Pc

    Learn the tips how to protect your desktop from the spy bug,also you can protect you ip from attacks and remote control.

  • Learn How to protect your Wi-Fi

    Learn easy steps to protect your wifi from attacks,see how you can do this on our blog

  • Protect Your Credit Card From Spam

    Today,we have many attacks in the web,it's the credit cards attack,many people was hacked and loose a lot of money,and today we gonna to show you how to protect your credit card from attacks

  • Daily Tips from an expert

    We are a team of expert in internet security,everyday we post tips to protect you from attacks on the web.

vendredi 19 août 2011

0

17.3 laptop bag cheap model from microsoft



This particular Microsoft Edge 17.3 laptop bag is designed for business people, casual professionals and those people who prefer nice looking and no to attract attention bag. It is packed with many useful compartments and accented with trendy orange accents. No matter where you are or where you need to go, it will easily store all your needed gadgets, material, document and files, pencils and other stuff. Main compartment for the laptop is comfortably padded to protect your 17.3 laptop and additionally features adjustable divider in case that you have smaller laptop. On the inside you have two file pockets, media pocket that will hold 4 CDs/DVDs, flash drive pocket, also you will find hidden zippered pocket for water bottle and separated MP3 compatible pocket with headphone port. All in all, Microsoft Edge Messenger 17.3 Laptop Bag will protect with ease your machine and it will additionally help you organize and carry anything you need. For a small price you will get amazing product!
in case that you need nice looking, really stylish 17.3 laptop bag than take a closer look at Mobile Edge 17.3-Inch Large SlipSuit. It is made from very durable and water resistant neoprene with nice padding for your laptop. Without a problem you may slip inside your 17.3 inch laptop and you will than see that there is even more room for larger device. On the other hand, it is small enough to not disturb you while you carry around your laptop together with needed things like files and smaller books. Nice design is combined with practicality so you may place inside all your wires, power adapter, CDs and other accessories. It holds laptop in place and protects it from all outside weather conditions. In another zippered compartment you may place your mouse and mouse pad if needed. With all this mentioned you will not have much more space for anything else, but you must agree that that is just enough for one 17.3 laptop bag. According to user reviews seen on Amazon, I must say that customers are more than happy with their purchase.

jeudi 18 août 2011

0

Google Chrome the #1 Navigation software in the world


Google Chrome has quickly become one of our favorite browsers here at RWW, but as Ryan Narraine, a security evangelist at Kaspersky Lab,reports, Chrome has also inherited a potentially serious security flaw from the old version of WebKit it is based on. An attacker could easily trick users into launching an executable Java file by combining a flaw in WebKit with a known Java bug and some smart social engineering.

Security expert Aviv Raff, who first discovered this flaw, set up a demo of the exploit here. (Note: This page will automatically download a Java file onto your desktop). You can safely click on the download, as it only opens up a notepad application written in Java.



Google, which shows the warning graphic here, calls these malware payloads "drive-by downloads."
The move comes just days after email marketing power Epsilon said that attackers had stolen customer data belonging to several of its clients, including Target. Epsilon said thieves might use the information to launch a phishing campaign to trick users out of more sensitive personal data.
For now, Google is test-driving its anti-drive-by download feature for a subset of users who subscribe to the Chrome development release channel.
The goal is to make this feature available to all users in the next stable release of Google Chrome, which would be Version 11. This browser version is still in the developer channel.
This is the latest in a line of malware defenses Google has created.
Google's Safe Browsing API lists malicious Websites to warn users of Google search and browsers such as Chrome, Mozilla Firefox and Apple Safari who try to visit these dangerous Web pages. While Safe Browsing has helped, plenty of Websites still execute click fraud, steal users' passwords or surface spam.
Google's new warning feature will be displayed for any download URL that matches the malicious Website URLs published by the Safe Browsing API.
However, this feature does not enable Google to determine the URLs users are visiting, in accordance with the Safe Browsing privacy rules.
It's heady days for hackers. In addition to the Epsilon breach, Google's new drive-by download protection comes just days after Google unveiled two security projects to improve the SSL (Secure Sockets Layer) infrastructure, which was rocked by the Comodo digital certificate spoofing incident late last month.
A lone hacker infiltrated Comodo Security's root authority system, logging in and issuing digital certificates to Websites owned by Microsoft, Google, Yahoo, Skype and Mozilla.

0

An easy image editing software






Photoscape it's an easy software to edit your photo or your image also it contains a lot of effect:

Editor: resizing, brightness and color adjustment, white balance, backlight correction, frames, balloons, mosaic mode, adding text, drawing pictures, cropping, filters, red eye removal, blooming, clone stamp
Batch editor: Batch edit multiple photos
Page: Merge multiple photos on the page frame to create one final photo
Combine: Attach multiple photos vertically or horizontally to create one final photo
Animated GIF: Use multiple photos to create a final animated photo
Print: Print portrait shots, carte de visites(CDV), passport photos
Splitter: Slice a photo into several pieces
Screen Capture: Capture your screenshot and save it
Color Picker: Zoom in on images, search and pick a color
Rename: Change photo file names in batch mode
Raw Converter: Convert RAW to JPG
Paper Print: Print lined, graph, music and calendar paper
Face Search: Find similar faces on the Internet


0

How to choose a perfect laptop bag








Buying a Laptop bag is as important as buying a laptop. We need to know that a laptop bag is not only for carrying your laptop safely, it also shows people what type of person you are. Price is not the only factor when it comes to buying a laptop bag. There are other factors like usage, surroundings, trend, material, size, color and etc.


Do a small google search about the laptop bag types and styles available. But make sure you pick the right one since it will have an impact to what you do and where you go. Just figure out if you want the professional look or the casual look. 
Learn what laptop bag styles available and what features each different style of laptop bag has to offer mobile professionals.


The different types of Laptop Bags available are brief bag laptop bags, top loading laptop bags, backpack laptop bags, messenger Style laptop bags, rolling laptop bags, ladies laptop bags and the men's laptop bags. 

The next main factor is the size. Make sure your note book fits well in the laptop bag you choose and there is enough space for the accessories. Also make sure your laptop is water resistant. Depending on the elements in your home and work place, choose the material of the laptop bag. The come in Cordura, Nylon, Polyster, Suede, Vinyl, Cotton, Denier Cordura, Denim, Duralite, Koskin, Micro fiber and Top grain leather.

When it comes to the weight of the laptop bag, make sure your laptop bag do not weigh more than your laptop. Laptop bags offer interior power modules; convenient space for accessories and quick access pockets for mobile phones, space for documents like tickets, maps. At last knowing the manufacturers warranty and if the warranty will give you a peace of mind.

Source

mercredi 17 août 2011

0

Easy Ways to protect your PC






Many agree that Windows computers need to be protected with a strategy calleddefense in depth. This is not just for fighting off viruses. Clearly, network securityand Internet Explorer also need defense in depth. When Internet Explorer was recently hacked in a public contest, Microsoft responded that "...defense in depth techniques aren't designed to prevent every attack forever, but to instead make it significantly harder to exploit a vulnerability."
Deb Shinder, a Windows expert, and former law enforcement officer, put it in perspective recently:
"Think about your physical security. You might have a high fence, a big dog, deadbolts on the doors and a security alarm system, but if a burglar is absolutely determined – and has enough time – he can climb the fence, shoot the dog, disable the alarm and break a window to get in. Unless you live in a fortress (and even then), your security is not fool-proof. But all those mechanisms do slow him down ... So unless he’s motivated to specifically target your house because he knows you have $1 million in cash hidden under the mattress, he’ll probably go elsewhere, where the pickings are easier."
To me, the term "defense in depth" means my having to do a lot of work. But what work? What steps offer the biggest bang for the buck?
1. To me, the most important thing you can do to protect your computer is to be skeptical. Start with the assumption that you are being lied to. No software can protect someone who lets the bad guys continually scam them.
For example, that email message may not have come from the visible FROM address. Even if it did, the senders email account may have been broken into and the message could be from a scammer. Same for instant messages.
Many tricks can be played with links to make them appear to go one place when they actually go somewhere else, and that was before link shorteners made hiding the true destination even easier. You probably don't need to install a new codec to see that enticing video. Your computer is probably not infected with 314 viruses. Even notices about updating software to install the latest patch may not be legit.
2. Software-wise, techies are always advising to keep up to date on patches for your installed software. What doesn't get said often enough is that this is an all but impossible task for Windows users. Thomas Kristensen of security company Secunia reported recently "that in order for the typical home user to stay fully patched, an average of 75 patches from 22 different vendors need to be installed [every year]..." Seventy Five patches/year seems low to me.
Without a standard pipeline through which all these companies can funnel patches, Windows users are forced to deal with many different and inconsistent patch delivery systems. It's a brutal mess, and one not likely to have a good solution for a very long time.
Secunia offers three patch related products. To me, the best bang for the buck is offered by their freeOnline Software Inspector. I wrote about this in depth recently (Check (All) Your Windows Patches: Secunia). Their other products check more software, but the online service checks the most popular applications, offers a very simple and easy-to-read report and includes links to the latest software updates.
3. There is surprising resistance to my third suggestion, but it's a great way to protect yourself when keeping up to date on bug fixes is impossible: run as a limited (Windows XP term) or standard (Windows 7 term) user. I've been doing this for a while now on both Windows XP and 7. There is a small annoyance factor, but compared to the extra safety it offers, the tradeoff seems well worth it. The annoyance factor is higher in Windows XP. Much more thought seems to have gone into this in Windows 7.
Here's my approach. My current Windows userid was typically "Michael" and it was an Administrator. First, I create another Windows user called "MichaelAdmin" with the same password as user "Michael". Then I log off user "Michael", log on to user "MichaelAdmin" and drop user "Michael" down to a limited/standard user. From here on in, I continue to use user "Michael", only logging on as "MichaelAdmin" when necessary to install software or otherwise update the system.
0

What's a Cyber Crime


Computer crime, or cybercrime, refers to any crime that involves a computer and a network.The computer may have been used in the commission of a crime, or it may be the target. Netcrimerefers to criminal exploitation of the Internet. Such crimes may threaten a nation’s security and financial health Issues surrounding this type of crime have become high-profile, particularly those surrounding crackingcopyright infringementchild pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nationstate is sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions through the International Criminal Court.




Punishment:



Cybercrime must be dealt with very seriously because it causes a lot of damage to businesses and the actual punishment should depend on the type of fraud used.

ÞThe penalty for illegally accessing a computer system ranges from 6 months to 5 years. The penalty for the unofficial modification on a computer ranges from 5 to 10 years. Other penalties are listed below:

®Telecommunication service theft: The theft of telecommunication services is a very common theft and is punished with a heavy fine and imprisonment.

®Communications intercept crime: This is a Class-D crime which is followed by a severe punishment of 1 to 5 years of imprisonment with a fine. Other cyber crimes like telecommunication piracy, offensive material dissemination, and other cyber frauds also belong to this category.

ÞInformation Technology Act-2000: According to this act, different penalties are available for different crimes. Some of the penalties are as follows:

®Computer source document tampering: The person who changes the source code on the website or any computer program will get a punishment up to 3 years of imprisonment or fine.


Computer hacking: The individual who hacks the computer or computer devices will get an imprisonment up to 3 years or a fine.

®Government protected system: An act of trying to gain access to a system which is a protected system by the government, will result in imprisonment for 10 years and a heavy fine.

®The introduction of such penalties have lead to a drastic reduction in the cyber crime rates as more and more criminals are becoming aware of the penalties related to them. Spreading the word about the penalties of cyber crime can serve as a deterrent against such crime.

Penalties relating to cyber crime will vary depending on the country and legislation in place.