Saturday, May 21, 2011

The Advancement of the Keylogger


A keylogger is a program that runs in your computer’s background secretly recording all your keystrokes. Once your keystrokes are logged, they are hidden away for later retrieval by the attacker. The attacker then carefully reviews the information in hopes of finding passwords or other information that would prove useful to them. For example, a keylogger can easily obtain confidential emails and reveal them to any interested outside party willing to pay for the information.

Keyloggers can be either software or hardware based. Software-based keyloggers are easy to distribute and infect, but at the same time are more easily detectable. Hardware-based keyloggers are more complex and harder to detect. For all that you know, your keyboard could have a keylogger chip attached and anything being typed is recorded into a flash memory sitting inside your keyboard. Keyloggers have become one of the most powerful applications used for gathering information in a world where encrypted traffic is becoming more and more common.

As keyloggers become more advanced, the ability to detect them becomes more difficult. They can violate a user’s privacy for months, or even years, without being noticed. During that time frame, a keylogger can collect a lot of information about the user it is monitoring. A keylogger can potential obtain not only passwords and log-in names, but credit card numbers, bank account details, contacts, interests, web browsing habits, and much more. All this collected information can be used to steal user’s personal documents, money, or even their identity.

A keylogger might be as simple as an .exe and a .dll that is placed in a computer and activated upon boot up via an entry in the registry. Or, the more sophisticated keyloggers, such as the Perfect Keylogger or ProBot Activity Monitor have developed a full line of nasty abilities including:

• Undetectable in the process list and invisible in operation
• A kernel keylogger driver that captures keystrokes even when the user is logged off
• A remote deployment wizard
• The ability to create text snapshots of active applications
• The ability to capture http post data (including log-ins/passwords)
• The ability to timestamp record workstation usage
• HTML and text log file export
• Automatic e-mail log file delivery

All keyloggers are not used for illegal purposes. A variety of other uses have surfaced. Keyloggers have been used to monitor web sites visited as a means of parental control over children. They have been actively used to prevent child pornography and avoid children coming in contact with dangerous elements on the web. Additionally, in December, 2001, a federal court ruled that the FBI did not need a special wiretap order to place a keystroke logging device on a suspect’s computer. The judge allowed the FBI to keep details of its key logging device secret (citing national security concerns). The defendant in the case, Nicodemo Scarfo Jr., indicted for gambling and loan-sharking, used encryption to protect a file on his computer. The FBI used the keystroke logging device to capture Scarfo’s password and gain access to the needed file.

Thursday, May 19, 2011

Planet Gliese 581d Livable Ascertained

Gliese 581d, a rocky planet orbiting a giant red dwarf stars (stars with masses lower than the sun and the temperature below 4000 degrees Kelvin) is confirmed as the first planet that meets the requirements to accommodate life.

Planet which is about 20 light-years from Earth is one of our closest neighboring planet. He estimated temperature is warm enough and wet enough to cultivate a similar life-owned planet Earth.

Orbiting Gliese 581d in the Goldilocks zone (the area where possible life forms) belonging to the star Gliese 581. As is known, in the Goldilocks zone, the temperature not too hot, causing the water to boil or not too cold to make it freeze but it was in the right temperature so that water remains in liquid form.

"With a dense atmosphere of carbon dioxide will, which is the most probable scenario for giant planet, Gliese 581d stable climate and warm enough to have oceans, clouds, and rainfall," researchers said the National Centre for Scientific Research (CNRS).

Quoted from the Daily Galaxy, May 19, 2011, according to research published in the Astrophysical Journal Letters, Gliese 581d has a mass of at least 7 times bigger than the Earth is about 2 times the planet Earth.

Before this, the attention of astronomers precisely the focus to his brother, the planet Gliese 581g, after it emerged that the planet has a mass similar to Earth's mass and also near Goldilocks zone.

Was first discovered in 2007, Gliese 581d candidate was not originally signed as a place to search for extraterrestrial life. One reason is that he only gets a third of solar radiation as Earth and possibly get 'tidally locked' or just one side that always faces its sun and have a permanent day and night.

However, the latest model made by Robin Wordsworth, Francois Forget, colleagues and other CNRS researchers show a surprising result. Planet's atmosphere is able to store heat thanks to the dense gas CO2 and warmed by the light from the star.

"Overall, there temperature allows liquid water is present on the surface of the planet," said the researcher. "The mass of the planet that also means the gravity on its surface approximately two times higher than Earth's gravity," he said.

However, researchers can not simply send astronauts to the planet. From Earth, the spacecraft that can fly at speeds approaching the speed of light takes more than 20 years to get there. Unfortunately, the rocket technology that has been owned human beings has been only able to deliver us to Gliese 581d in 300 thousand years.

Wednesday, May 18, 2011

Protection You Can Afford


There are numerous ways you can lose the information on your computer. Your child decides to play Chopin on your keyboard, a power surge, lightening, a virus, or even simple equipment failure. Therefore, backing up the contents of your hard drive is an absolute MUST. By regularly making backup copies of your files and storing them in a separate location, you can typically get some, if not all, of your information back in the event your computer crashes.

While a regular backup to floppy, CD, or zip drive will save your files, wouldn’t it be great if you could create an exact copy (a drive image) of your hard disk? That means backups of all your files, programs, and user settings. This would definitely save you time when it came to reloading. Acronis may be able to help.

Acronis True Image 9.0 is a robust disk-imaging utility software that copies the entire contents of your hard drive including data and operating system files, personalized settings, and more, onto another disk or disk partition. Its layout is easy to use and navigate. It also includes wizards which can walk you through both backing up and restoring your computer. Highlighted features include:

• Secure Zone — allows you to save data to a special hidden partition located on your hard drive which would eliminate the need to purchase an extra hard drive.
• PC Cloning — you can upgrade to a new system disk without needing to reinstall the operating system and applications, or configure user settings.
• Acronis Snap Restore - lightening-speed restore of your PC from an image. You can start working in seconds while your system is still being restored.

Acronis provides a free test-drive of its product and a 30-day money back guarantee. When you are ready to purchase, you can either download for $49.99, or if you so desire, order a boxed version for $59.99. With Acronis True Image Home 9.0, you can rest easy that your family pictures, personal documents, tax returns, resumes, and other important information will not be lost forever.

Monday, May 16, 2011

Fujitsu announced the launch of the ScanSnap N1800


Fujitsu announced the launch of the ScanSnap N1800, network document scanner the first to offer features connection to various services such as Salesforce CRM Cloud, Google Docs and Evernote.

This scanner combines functionality with ease of use so that the scanning process and share documents seamlessly take place without the complicated process of preparation.

ScanSnap N1800 has a fully functional so that more cost effective because users do not need to purchase additional hardware. Users simply press one button to start the scanning process so that the accelerating digitalization of documents in order to facilitate access to information within the company.

The scanner is equipped with features advanced security to ensure the protection and safety when used by many users.

N1800 ScanSnap is a compact size, only 300mm x 226mm x 172mm, and is equipped with the Installation Wizard for easy installation in an office environment.

Administration function allows you to manage and organize a network consisting of many ScanSnap N1800, only from a single console. Menu on the touch panel and scan settings can be adjusted to the specific needs of users or groups of users so that more optimal in supporting work activities.

"Along with the trend of Internet-based IT networks, ScanSnap N1800 is designed with a variety of network capacity to meet the needs of today's business is increasingly challenging. This scanner can be placed in the organization's intranet system, but with features connection to the Cloud service, we aim to increase efficiency and productivity in the workplace, "said Janet Tan, Regional Director of the Fujitsu Imaging Products, told through its official statement on Monday (16 / 5 / 2011).

"Innovation Fujitsu in bringing the concept of an ideal document solution works efficiently and effectively become a reality. ScanSnap N1800 allows users to scan and upload documents to the cloud and access digital data from anywhere through a single touch. It is very easy in the sharing of information, "said Raymond Firdauzi, Country Head of Product Platforms Fujitsu Indonesia.

"ScanSnap N1800 Fujitsu will strengthen its position as the leader of the document scanner market in Indonesia since the second half of 2009 both in terms of volume and revenue."

Price ScanSnap N1800 is USD2, 070 and already available in Indonesia, Singapore, Malaysia, Thailand, Vietnam, Philippines and India.

Translated by Google
Oroginal Source:http://techno.okezone.com

Sunday, May 15, 2011

How many spyware items are infecting your computer?


I just had, by mistake, a plug-in called Intelligent Explorer attach to my browser. What a nightmare! I have another article on this topic, but this brings home a point. Spyware or adware items are continually infecting computers. Most computers have no protection from them. Most frightening is the frequency of them. From the InfosecWriters web site, "According to a 2004 survey by America Online and the National Cyber Security Alliance, 91% of users questioned were familiar with the term spyware. Only 53% believed their computers were infected, but a scan found that 80% of their PCs had some type of spyware installed on them." It goes on to say, "...The average number of spyware components per computer was 93 with one computer having well over a thousand."

What is Spyware?

Butte College (www.bctv.butte.edu/support/spyware.html) offers this definition:

“The term ‘spyware’ is broadly defined as any program that gets into your computer without permission and hides in the background while it makes unwanted changes to your user experience.
Spyware is generally not designed to damage your computer. The damage it does is more a by-product of its main mission, which is to serve you targeted advertisements or make your browser display certain sites or search results.
At present, most spyware targets only the Windows operating system (Internet Explorer).”

To be fair, spyware can be harmless, for example tracking cookies don’t do much. While such things infringe on your privacy, they don't really harm anything. Others, however, are extremely dangerous.

So what do you do about it?

No spyware program seems to do everything, but there are a lot of goods solutions out there that can help. Here is a list of some of the top Spyware tools to look at:


1) Try Ad-Aware 6.0 Professional from LavaSoft (there is also a free version with less functionality)

2) Spybot Search & Destroy from PepiMK Software


3) Xoftspy form Pareto Logic

5) Spyware Guard from Javacool Software is a free program

4) Pest Patrol (now part of Computer Associates by acquisition)

5) McAfee Anti-Spyware

One thing is for certain: you do need to take spyware seriously. For some reason, too many people out there think anti-virus solutions are the end-all solution. They are not.

And, when all else fails?

Finally, as drastic as it seems, if your computer has been infected with a large number of spyware programs, the only solution you may have is backing up your data, and performing a complete reinstall of the operating system.

make your reading easy bye Reader Book Light


eReaders have certainly picked up the pace over the years, what with the introduction of touchscreen devices and what not. Well, some of us might have migrated our in-bed reading habits from a paperback to a paperless version with the slew of eReaders around, but what happens when you are looking for the perfect reading light solution that won’t disturb your soundly sleeping partner while not straining your eyes at the same time?
Enter the eReader Book Light, where it lets you shine a bright light at any angle and in any direction thanks to a fully adjustable and flexible arm. There is also a special e-flector that prevents glare while focusing soft, diffused light onto the screen. Capable of delivering more than 15 hours of readable light, each $30 purchase will come with batteries to get you started right out of the box.

Saturday, May 14, 2011

Fighting off Viruses: Advancements in Antivirus Software Suites


Protecting your computer from a virus is getting harder and harder each day. While it may border on the paranoid, it goes without saying that you can’t leave your guard down for one second. Even corporate giant Microsoft has found its own systems compromised on more than one occasion.

Remember the “good old days”, before the advent of the Internet and downloadable programs? Life was simple then in terms of computer viruses. With the primary way in which a virus could be transmitted being limited to floppy disks, the ability to catch and eradicate the virus was a lot easier. By today’s standards, it used to take quite a while before a virus was able to infect a computer and slow down the system. The antivirus software of that time was typically able to identify and eradicate viruses before they caused too much damage. Additionally, computer users were pretty savvy on how to protect themselves in terms of scanning all floppy disks before copying them to our desktop.

The Internet helped change all that. The Internet provided a conduit by which viruses could move from host to host with lightening speed. No longer could a computer user just worry about floppy disks as points of entry, but they now had to worry about email, email attachments, peer-to-peer file sharing, instant messaging, and software downloads. Today’s viruses can attack through multiple entry points, spread without human intervention, and take full advantage of vulnerabilities within a system or program. With technology advancing everyday, and the convergence of computers with other mobile devices, the potential of new types of threats also increase.

Protecting Your Computer
Luckily, the advancement of antivirus software has kept pace with current virus threats. Antivirus software is essential to a computer’s ability to fend off viruses and other malicious programs. These products are designed to protect against the ability of a virus to enter a computer through email, web browsers, file servers and desktops. Additionally, these programs offer a centralized control feature that handle deployment, configuration and updating.
A computer user should remain diligent and follow a few simple steps to protect against the threat of a virus:

1. Evaluate your current computer security system.
With the threat of a new generation of viruses able to attack in a multitude of ways, the approach of having just one antivirus software version has become outdated. You need to be confident that you have protected all aspects of your computer system from the desktop to the network, and from the gateway to the server. Consider a more comprehensive security system which includes several features including antivirus, firewall, content filtering, and intrusion detection. This type of system will make it more difficult for the virus to penetrate your system.
2. Only install antivirus software created by a well-known, reputable company.
Because new viruses erupt daily, it is important that you regularly update your antivirus software. Become familiar with the software’s real-time scan feature and configure it to start automatically each time you boot your computer. This will protect your system by automatically checking your computer each time it is powered up.
3. Make it a habit to always scan all new programs or files no matter from where they originate.
4. Exercise caution when opening binary, Word, or Excel documents of unknown sources especially if they were received during an online chat or as an attachment to an email.
5. Perform regular backups in case your system is corrupted. It may be the only way to recover your data if infected.

Recommended Antivirus Software
There are numerous applications available to consumers. With a little research, you can pick the program that is right for you. Many programs provide a trial version which allows you to download the program and test its abilities. However, be aware that some anti-virus programs can be difficult to uninstall. As a precaution make sure to set up a System Restore point before installing.

Here are a few programs which typically receive high marks in terms of cost, effectiveness, ease of use, and customer service.


The Shield Pro ™ provides virus protection and hacker security through ongoing support and updates. When a virus breaks out, The Shield Pro™ promises to provide a patch within 2-3 hours and a fix for the virus within 5 hours. You can set your computer to update viruses weekly and run a complete virus scan.

BitDefender 9 Standard provides antivirus protection, as well as Peer-2-Peer Applications protection, full email protection, and heuristics in a virtual environment. This provides a new security layer that keeps the operating system safe from unknown viruses by detecting malicious pieces of code for which signatures have not been released yet.

Kaspersky Anti-Virus Personal  program is simple to install and use. The user only needs to choose from three levels of protection. It allows updates as frequently as every hour while promising not to disrupt your computer. The program also offers a two-tier email protection feature and round-the-clock technical support.

PC-cillin Internet Security combines antivirus security and a personal firewall—for comprehensive protection against viruses, worms, Trojans, and hackers. It also detects and removes spyware and blocks spam. It even guards against identity theft by blocking phishing and pharming attacks.

AVG Anti-Virus Free Edition is a free downloadable antivirus program that has received high marks for its reliability. In the past, free downloadable antivirus programs have been viewed skeptically because of issues relating to its reliability. However, AVG from Grisoft, remains one of the best-known free anti-virus programs available. While AVG can not be installed on a server operating system and there is no technical support, it still makes a good choice for many home computer users. The best part is that since it is free, you can try it with no further obligation necessary.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | cna certification