Comparison of Galaxy S III vs iPhone 4S vs HTC One X

The battle in the mobile market is sure to be a class above the more intense after the presence of Samsung Galaxy S III.

Showing posts with label Secrurity. Show all posts
Showing posts with label Secrurity. Show all posts

Beware of Attacks Ramnit Computer Virus

After some horrendous virus like Stuxnet, Sality, Virut and Shortcut, there are now Ramnit that is equally sophisticated. This malicious program is able to 'cooperate' with other viruses to infect the victim.Yes that's the uniqueness Ramnit compared with other viruses. After infect the victim computer, these malicious programs will download variants of other viruses.And even more confusing, the type of virus that you download will be different for...

Protect Company Data for Risk Anticipation

The protection of data and corporate assets is considered very important in anticipating the risk. For that, we need a reliable replacement facilities at the corporate data center to crash or malfunction that may interfere with the course of business. Facilities replacement or back-up from the data center known as the Disaster Recovery Center (DRC). According to Bayu Adi Pramod Data Center Product Manager PT Aplikanusa Lintasarta, build...

Beware of Fake Antivirus via Goo.gl on Twitter

Popularity of a website will automatically attract cyber criminals to took aim. Similarly, Twitter and its users, not escape from the target spreaders of malware and viruses.Graham Cluley of Sophos explained, the virus is transmitted through a short URL goo.gl. Users were led to open links a fake antivirus application which actually is a virus itself."Thousands tweeps found their accounts to post links that contain malicious programs without their...

5 Threat of Cyber 2010, which is still Dangerous

Various emerging cyber threats occur throughout 2010, some of which even involve big companies like Google and Facebook. Here are five threat cited by Admin from PC World, on Tuesday (28/12/2010).Threats via Google Street ViewGoogle service called Street View, it was also claimed to have a crack that could be exploited by crackers. That said, the data in and out through the application does not properly encrypted, so opened up opportunities for theft...

5 Cyber Security Trends in 2011

In fact, cyber crime is very attractive to criminals. With the growth of mobile services platform superb, criminals will have more ways to attack.Then would like  about cyber security trends in 2011? Here are 5 predictions according to Symantec:1. Important Infrasturuktur So Target Attack, Slow Reacting GovernmentThe attackers seemed to have seen the impact of the threats that attack Stuxnet in industrial control systems industry. Symantec estimates...

7 Tips for Keeping Passwords

Passwords are secret codes that must be protected. Many negative things can happen when your password leak into the hands of others. Learn 7 tips to keep it brief. 1. Not Using Default Password The default password is the password that we can be the first time. This default password should indeed be quickly replaced because of very vulnerable. The reason, the default password can be easily searched on google search, even there are listed...

Remove Vexira Safely and Completely from Windows

Is Vexira not the right fit for you now and you are finding ways out to uninstall it? Are you driven mad when you fail to remove all the annoying traces of Vexira which rib you off a perfect computer experience? What you should take into consideration is that you need to remove all Vexira's now-defunct registry entries and related files completely, or it will cause various computer errors and have negative effect on the other programs on your computer. How the hell can you safely and completely remove Vexira from your computer?How to uninstall...

Computers and Internet threats!

Computers are now a common thing. Every day, you may be associated with this object. Computers and the Internet has helped many of your work. Ease of finding information, perform various financial transactions, store or process data into something that is not too burdensome. But behind its simplicity, there are many threats that can destroy data or your computer either a PC or laptop.When you find your computer is not working properly, such as computers slow, hangs, look for missing data, display annoying when you're working, you may conclude...

Microsoft: Do not Press the F1 Currently Browsing

Microsoft found a weakness in software. In order to prevent this vulnerability exploited, the Redmond giant was also recommends users not to press F1 while browsing the web.As quoted from Microsoft Security Advisory, Wednesday (3/3/2010), a weakness has been discovered in VBScript. Strictly speaking, this weakness will affect computer running Windows XP and Internet Explorer browser (IE).This weakness could be exploited when a user presses the F1 key. Buttons are usually used to call the help function (Help menu) in Windows applications."If ...

Download Google Chrome 7.0 Offline Installer

After last month has released Google Chrome Chrome 6.0, this time one browser it has released the latest version of Google Chrome 7.0 Stable. In the 6.0 version of Google Chrome did a lot of changes to the side of the interface (interface), as in the Address bar no longer displays the http:// at the website address and the loss of bookmarks button in the address bar.As I quoted from the Google Blog Chrome, the Google Chrome 7.0 is more focused on a few bug fixes. Also, added also support for AppleScript in Mac OS X to implement HTML 5. Similarly,...

Prevent Users Delete or Uninstall Programs

way that the user can not remove or uninstall the program. Indeed, sometimes on a computer that is used by more than one user, where all users have administrator rights, the uninstall program could happen. Perhaps because of factors due to deliberate or mis accident. Moreover, the removed program is a very important program and coincidentally also the installer is not there anymore. It must be hard again to get the program. Then how do I prevent...