Thursday, August 30, 2007

Search engine: Google, Yahoo, Microsoft

A search engine is an information retrieval system designed to help find information stored on a computer system, such as on the World Wide Web, inside a corporate or proprietary network, or in a personal computer. The search engine allows one to ask for content meeting specific criteria (typically those containing a given word or phrase) and retrieves a list of items that match those criteria. This list is often sorted with respect to some measure of relevance of the results. Search engines use regularly updated indexes to operate quickly and efficiently. Without further qualification, search engine usually refers to a Web search engine, which searches for information on the public Web. Other kinds of search engine are enterprise search engines, which search on intranets, personal search engines, and mobile search engines. Different selection and relevance criteria may apply in different environments, or for different uses. Some search engines also mine data available in newsgroups, databases, or open directories. Unlike Web directories, which are maintained by human editors, search engines operate algorithmically or are a mixture of algorthmic and human input.

History
The very first tool used for searching on the Internet was Archie. [1] The name stands for "archive" without the "v". It was created in 1990 by Alan Emtage, a student at McGill University in Montreal. The program downloaded the directory listings of all the files located on public anonymous FTP (File Transfer Protocol) sites, creating a searchable database of filenames; however, Archie could not search by file contents. While Archie indexed computer files, Gopher indexed plain text documents. Gopher was created in 1991 by Mark McCahill at the University of Minnesota: Gopher was named after the school's mascot.[1] Because these were text files, most of the Gopher sites became websites after the creation of the World Wide Web. Two other programs, Veronica and Jughead, searched the files stored in Gopher index systems. Veronica (Very Easy Rodent-Oriented Net-wide Index to Computerized Archives) provided a keyword search of most Gopher menu titles in the entire Gopher listings. Jughead (Jonzy's Universal Gopher Hierarchy Excavation And Display) was a tool for obtaining menu information from various Gopher servers. While the name of the search engine "Archie" was not a reference to the Archie comic book series, "Veronica" and "Jughead" are characters in the series, thus referencing their predecessor.

Google
Around 2001, the Google search engine rose to prominence. Its success was based in part on the concept of link popularity and PageRank. The number of other websites and webpages that link to a given page is taken into consideration with PageRank, on the premise that good or desirable pages are linked to more than others. The PageRank of linking pages and the number of links on these pages contribute to the PageRank of the linked page. This makes it possible for Google to order its results by how many websites link to each found page. Google's minimalist user interface is very popular with users, and has since spawned a number of imitators. Google and most other web engines utilize not only PageRank but more than 150 criteria to determine relevancy[2]. The algorithm "remembers" where it has been and indexes the number of cross-links and relates these into groupings. PageRank is based on citation analysis that was developed in the 1950s by Eugene Garfield at the University of Pennsylvania. Google's founders cite Garfield's work in their original paper. In this way virtual communities of webpages are found. Teoma's search technology uses a communities approach in its ranking algorithm. NEC Research Institute has worked on similar technology. Web link analysis was first developed by Jon Kleinberg and his team while working on the CLEVER project at IBM's Almaden Research Center. Google is currently the most popular search engine.

Yahoo! Search
The two founders of Yahoo!, David Filo and Jerry Yang, Ph.D. candidates in Electrical Engineering at Stanford University, started their guide in a campus trailer in February 1994 as a way to keep track of their personal interests on the Internet. Before long they were spending more time on their home-brewed lists of favourite links than on their doctoral dissertations. Eventually, Jerry and David's lists became too long and unwieldy, and they broke them out into categories. When the categories became too full, they developed subcategories ... and the core concept behind Yahoo! was born. In 2002, Yahoo! acquired Inktomi and in 2003, Yahoo! acquired Overture, which owned AlltheWeb and AltaVista. Despite owning its own search engine, Yahoo! initially kept using Google to provide its users with search results on its main website Yahoo.com. However, in 2004, Yahoo! launched its own search engine based on the combined technologies of its acquisitions and providing a service that gave pre-eminence to the Web search engine over the directory.

Microsoft
The most recent major search engine is MSN Search, owned by Microsoft, which previously relied on others for its search engine listings. In 2004 it debuted a beta version of its own results, powered by its own web crawler (called msnbot). In early 2005 it started showing its own results live. This was barely noticed by average users unaware of where results come from, but was a huge development for many webmasters, who seek inclusion in the major search engines. At the same time, Microsoft ceased using results from Inktomi, now owned by Yahoo!. In 2006, Microsoft migrated to a new search platform - Windows Live Search, retiring the "MSN Search" name in the process.


Article Source : www.freewebweb.com

Your Guide To Safe Surfing At Traffic Exchanges

Everyday we are hearing more and more about identity theft, fraud and vandal hackers. Websites that have malicious scripts in them can install viruses, spyware, and adware on your computer without you even knowing it. You never really know who or what is actually behind any particular website that you are viewing and we recommend taking a few easy steps to make your surfing experiences smoother and more secure.

Virus Protection

This is, without a doubt, the most important kind of software you should install. Make sure you keep your virus definitions updated at all times. The key word here is UPDATED! Outdated virus definitions do little good at all. Some viruses actually do more damage if you are infected first and then try to install an anti-virus program. They explode like a bomb and start eating your vital memory resources and can lead to data loss. The point is, be proactive, not reactive when it comes to virus protection.

You can download the free anti-virus program, Grisoft
http://www.grisoft.com/promo/stay-protected-isw-free75cnv/

Grisoft is actually a very nice program, and does provide partial protection, but your virus protection software is not a good place to cut corners, so I recommend something more powerful.

Of course the leaders by far in terms of name recognition are:

Symantec - http://www.symantec.com/index.htm
McAfee - http://www.mcafee.com/us/

...and they definitely charge accordingly for their software.

Two less expensive alternatives that are nearly as good and will keep you well protected against harmful viruses are:

Anti Virus Protector - http://roidetect.novirus01.hop.clickbank.net/
Micro Anti Virus - http://roidetect.microa.hop.clickbank.net/

Anti-Spyware

There isn't 'one' software program that can provide you with 100%
protection, so a 'layered' approach is the best strategy.

To create layered virus protection, you should be running a stand alone anti-spyware program on your computer. You can find out about free anti-spyware programs at:

http://www.computersplus.biz/spyware.htm

In my opinion, Perhaps the best anti-spyware software ever developed is XoftSpySE. You can download a copy and get a free scan of your computer here:
XoftSpySE - http://roidetect.xoftspyse.hop.clickbank.net/

Password Managers

It is a very good idea to use a password manager so that you are not using your keyboard to type your passwords in when you login to your programs and payment processor accounts. Hackers have developed programs they maliciously place on your computer without your knowledge that can track your keystrokes. This is a real threat.

That's why it's important to use a password manager that automatically enters your ID and password information as soon as the respective login page appears. Your have essentially three choices; (1) keep a copy of all your secure info on a text document and use the copy and paste feature to login; (2) use the password management feature of your internet browser; or (3) purchase a 3rd party password management program.

The best strategy is #3. Using a 3rd party password manager for all of your important information should stop hackers dead in their tracks.

The best password manager on the market is, without a doubt:
RoboForm - http://www.roboform.com/

NEVER use your email or payment processor passwords for other things.
ALWAYS make your email and payment processor passwords difficult.

Web Browser

In my judgment, due to chronic security issues, Internet Explorer has proven not to be the best choice for surfing in general and surfing traffic exchanges in particular.

Mozilla FireFox with the NoScript extension installed is a much sharper sword when it comes to keeping your data safe.

NoScript will not allow any scripts to run on your browser unless you specifically give permission. Only allow scripts to run from websites and programs that you trust.

FireFox - http://www.mozilla.com
Firefox NoScript - https://addons.mozilla.org/firefox/

If your budget allows it, there is an all-in-one solution that may be to your liking. I recommend you use Invisus, an powerful and innovative security management program that gives Norton and Mcafee a run for their money.

Invisus - http://www.invisus.com/

Summary

The combination of virus protection overlapped with spyware software using the Mozilla Firefox browser and NoScript extension combined with the use of a password manager will make your internet surfing as trouble free and secure as possible.


Article Source : www.articlesbase.com Author: Scott Badger

Internet Tips

How to Disable and Enable Cookies

If you want to enable and disable the cookies then perform the following actions.

• In the Internet Explorer go to Tools > Internet Options > Security Tab > Click Custom Level.
• Go to the Cookies section.
• To enable: Set "Allow cookie that are stored on your computer" to "Enable" Set "Allow per-session cookies" to "Enable"
To disable: Set "Allow cookie that are stored on your computer" to "Disable" Set "Allow per-session cookies" to "Disable"

How to speed up the loading of HTML pages with images

If you want to increase the image’s loading time then just add the height and width tags in the image tag. e.g. . This can increase the images web pages loading time significantly.

How to find out the location of the website?

If you want to know that where the website is physically located, what’s the associated IP address of the website and what’s the registration information of the website use the following URL.

Domaintools.com and put your web address in it.

It will display all the required information regarding the website.

Tips to avoid Internet Fraud

Some of the known internet scams are jobs scams, charity scams, Nigerian money offers, work-at-home scams, scholarship scams, bogus credit card offers, phishing, get rich scams, fake check scams and investment scams etc. The best way to avoid all these scams is to block all the scams related email addresses and not open any email attachment from unknown source.

Google Operators

Link:domain name

It shows you the incoming links to a webpage

Cache:domain name

It shows the version of the webpage that Google has in its cache

Define:

Define shows the definition of the word that you enter after it define:

Intitle:keyword

If you use this operator then Google will restrict the results to the web pages that has same title as you specified keyword.

Inurl:

If you use this operator then Google will restrict the results with searches that contain the same word in the URL.

Internet Security Tips

According to Antivirus Solutions Company Symantec that every computer, which is connected to internet can be infected in only 20 minutes if no proper security measures have been deployed on that computer. The best tips of being secure on the internet are use an up-to-dated antivirus program, anti spyware program and firewall software. Using updated antivirus program and regularly scanning your computer with it makes you secure while you get connected to internet.


Article Source : www.articlesbase.com Author: Bushra Bashir

How to Secure your Computer

According to a Software security and Antivirus company Symantec, it only takes 20 minutes for an unprotected computer to be attacked once it gets connected with the internet. Computer security cannot be compromised because if your computer is insecure then all your data, software and hardware are at risk. There are several methods that are used to combat with the security threats. The known threats to a computer are viruses, spyware, adware, malware, Trojan horses, internet security threats, accidental files deletion and data corruption, unauthorized access to compute and the hackers’ attacks. Following tips tells that how to deal with the computer security threats.

Install Up-to-dated Antivirus Program

One of the most important security step and preventive measure is to install an up-to-dated antivirus program and scan your computer regularly with it. An antivirus programs acts as protective shield for your computer against the virus, spyware and other internet threats.

Install Firewall

A firewall is a protective boundary that protects your computer from the unauthorized access and from the hackers’ attacks. If you haven’t enabled a firewall software or hardware on your gateway computer then anyone can get into your computer.

Install Anti spyware

Installing a good anti spyware program eliminates the chances of data corruption, Windows registry corruption, slow computer booting, browser’s hijack and applications failure. The combination of Antivirus + Anti Spyware + Firewall program is a very good choice.

Update your operating system with service packs and patches

Services packs and the security patches fix the security holes and other vulnerabilities in the operating systems. If you are using Windows based operating system then there is automatic update option in the control panel of the Windows and you can set schedule updates of the operating system from the Microsoft’s website.

Beware of suspicious emails and attachments

Suspicious emails and email attachments is a very common cause of the viruses. The best safety measures it not to open the suspicious emails from the unknown source.

Uninstall Unnecessary Programs

For getting the optimized performance from your computer, uninstall all the unwanted programs and delete temporary internet files. You will notice increased performance of your computer.

Deploy Encryptions

Another important security measure is to prevent your important files with the encryption. Also for protecting your important data from accidental deletion, make your files to read only.

The above mentioned tips provide the best safeguard against the known offline and online threats.


Article Source : www.articlesbase.com Author: Bushra Bashir

Mac Minis and Its Security

Apple builds some sexy hardware and software, but many people prefer to use their stuff for their work and research because it simply allows more productivity and is more pleasurable to work with.

Mac minis: Like the iMac G5 January 2006, the Intel iMac April 2006, and the Mac Book Pro May 2006, the new Mac mini includes Apple's Front Row software and the Apple Remote, which gives you the ability to control the playback of movies, photos, and music without having to sit in front of a keyboard.

The minis now have Serial ATA hard drives, which offer 1.5 times the bus bandwidth of the previous ATA drives. Apple retained the single FireWire 400 port but doubled the number of USB 2.0 ports on the back from two to foura welcome addition. Earlier models were practically unusable without adding a USB hub to gain access to extra ports.

When it comes to graphics-intensive 3-D games, our tests of the Intel-native version of Unreal Tournament showed disappointing frame rates of 12.2 per second for the Core Duo and 10.4 per second for the Core Solocompared with 14.5 and 13.9 for the 1.42GHz G4 mini and the 1.25GHz G4 mini, respectively.The Mini comes pre-installed with Apple's Front Row software. This is an extremely slick interface that lets you browse your iTunes and iPhoto libraries using the Apple remote control.

The new Mac minis take a different approach to graphics than their predecessors. Last year, Apple trumpeted the ATI Radon 9200 graphics chip with 32MB of dedicated DDR memory instead of a graphics structure that borrowed its memory from the system. But in the new minis, that's exactly what Apple uses. The mini's integrated graphics feature is a mixed bag, though, since it adds to and subtracts from the previous graphics features.

In January 2005, Apple introduced the Mac mini as a low-cost Macand it still is, even though the price of admission has increased by $100. The Mac mini Core Duo's built-in improvements and performance boost are worth the higher cost. And although the Core Solo model clearly underperforms compared with the Core Duo in almost every respect, it's still a good entry-level Mac for the money.

As computers become an integral part of everyday life, security becomes increasingly vital. Securing your Mac is obvious, but far more important is the data that it contains.

If somebody steals your Mac they can spend a lot more time trying to gain access to the data on it. The techniques that you use to deter the casual thief will generally only take a few minutes to overcome, enough to stop someone who wanders by your desk when it is unattended but not enough to be an inconvenience to you when you are using the computer.

For home users the cost of replacing a lost computer is a much bigger issue but it is still important to consider what information the thief will have access to if they manage to get their hands on an unsecured Mac.

You need to take strict security measures all of the time as it is just as easy to leave it in a taxi or have it taken from your table when you pop to the toilet as it is to have it stolen from your home or office.If you are wanted to know the everything about the Mac world that just log on to these websites.

http://www.dvwarehouse.com/

http://www.idigitals.com/

http://www.applepart.com/

The internet is the best place to buy cheap computer parts. Due to increase in demand for many parts in many suppliers find it profitable to sell their products online. The online dealers have their websites, which offer information on the various types of Mac parts available for purchase.

Article Source : www.articlesbase.com Author : Harry Johnson

Protecting your Computer and your Life Through Mcafee Internet Security Suite 2006

You can never deny the fact that the Internet is one of the most essential and one of the most important tools man uses today. Through the Internet, you will be able to chat with family and friends for free, do your groceries, shop for clothes, and through the Internet, you can also shop for real estate properties and cars.

Because of this technology, the Internet is now considered to be an important factor in life and in business. Many companies today are now using the Internet for advertising as well as a tool to sell their goods and services.

However, the Internet also has its drawbacks. Since it is connected to your computer, all your personal and financial information are exposed to other people. Having an Internet is like welcoming strangers in your own home and letting them install surveillance equipments right under your nose.

The thought of it could make anyone cringe. This is why there are companies today that develops software programs to protect you from malicious software, adware, spyware, and viruses. There are programs that even protect you from intruders that may access your personal files in your computer which may have your personal and financial information and use it to commit identity theft.

It is a fact that many people using the Internet without the proper protection from malicious softwares have been victimized by identity theft and suffered from huge financial losses and have also been involved in criminal cases that they didn’t even know they committed.

This is why you should protect your computer and yourself with an Internet security software to avoid being victimized by malicious software, hackers, identity thieves, and viruses. One kind of software that has a good reputation for fighting of this malicious software is called the McAfee Internet Security Suite 2006.

The McAfee Internet Security Suite 2006 contains all the necessary programs to protect you from malicious software circulating around the Internet. McAfee has a good reputation for warding of onlione threats and viruses.

The company has three versions of their software. One is for your Home and Home Office, the second is for small and medium businesses, and the last one is for enterprise and industries. Depending on the security level you need, you should get the software that suits your needs.

McAfee Internet Security Suite 2006 offers one of the best securities for every kind of computers. They offer automatic updates for virus and other malicious software definitions to better protect you from the new threats being created in the Internet everyday. McAfee also offer protection from the different kinds of spyware.

Other benefits of McAfee Internet Security Suite 2006 are that it’s very easy to use, and is able to provide the best Internet security available. With features that enable zero-day protection and successfully blocks spyware and malware, McAfee is definitely the choice of many people around the world when it comes to online security.

McAfee Internet Security Suite 2006 is readily available for purchase in the McAfee website. All you have to do is click on the buy now link, enter your credit card information and download the complete version of the program. Or, you can download the free demo version if you want to try it out first before buying. If you have owned previous versions of McAfee Internet Security before, you know how efficient it gets to protect you from malicious software and viruses.

Article Source : www.articlesbase.com Author : John Ugoshowa

Why Uninstall your Norton Internet Security

People use the internet on a daily basis to communicate, and transact businesses. Some people even do all their shopping online because it’s much more convenient than going out to the mall and shop there. Because of online shopping, you can buy anything you want right in the comforts of your own home.

However, the fact that the internet is being used by people for financial transactions, there are also people would take advantage of this wonderful technology to steal from other people using the internet. They can do this by simply using a spyware program.

What a spyware program does is that it would extract any kind of information in your computer including your personal and financial information. With this information, the spyware program developer will be able to use it to steal from you by committing identity theft.

There are also computer viruses circulating the internet and are aimed to destroy or corrupt your computer files and render it useless. With all the dangers in surfing the internet and downloading files from it, you would want some protection to avoid anything bad to happen to you or your computer.

By installing the latest Norton Internet Security software, you would be creating a very good defense against the invaders in the internet. It can protect you from spyware, computer viruses, adware, hackers, and other malicious software circulating the internet in a daily basis.

Norton Internet Security software is considered as one of the best internet security software available in the market today. It is integrated with several softwares in one package. Each of the software integrated in the Norton Internet Security have different tasks for different threats. For example, Norton Internet Security is integrated with an antivirus program to fight viruses, another program in Norton Internet Security is aimed to fight off spyware and adware.

There are more programs integrated in the Norton Internet Security. Each of the programs will surely be very beneficial for you and your computer.

However, as time passes, new computer viruses and new versions of other malicious software will eventually pop out in the internet. Some of these malicious software will be able to bypass your Norton Internet Security. Because of this, you will also need to purchase updated software in order to protect your computer and yourself from newer versions of malicious software.

In order to successfully install your new version of Norton Internet Security software, you have to uninstall your old version of the Norton Internet Security software first. To do this, you have to click on start; click on control panel and click on add remove programs. Choose Norton Internet Security and click on uninstall. The computer will automatically remove the software from your computer.

Once you finished uninstalling your old version of Norton Internet Security software, your computer will now be ready to be installed with the new version. Installation is easy; all you have to do is follow the step-by-step installation wizard. In a very short time, your computer will be ready again to surf the internet without you worrying about the new threats circulating the internet.

So, if your Norton Internet Security software is outdated, all you have to do is purchase the new version of the software, uninstall the old version and install the new Norton.

Article Source : www.articlesbase.com Author: John Ugoshowa

Technology Study Shows Spyware's True Threats

Spyware, adware and malware are all similar to each other, with each one attacking user's privacy in a different way and with varying purposes. Spyware is used by different intruders to either track internet usage information for advertising or to steal personal information and sell it which could lead to identity theft.

In a study done in an IDC based out of Massachusetts it was predicted that money spent on internet security from spyware will jump from $12 million in the U.S. during 2003 to $305 million once 2008 rolls around.

The study said most spyware security providers will continue to compete for having the top market products, including big name virus security companies such as Norton and McAfee who will release their spyware software to compete with already established anti-spyware providers. Millions of computers, mostly PCs, have been and continue to be infected with spyware, with the study estimating 67 percent of computers with an infection already.

Spyware makes itself difficult for users to rid of because it infects a computer's registry keys which can be touchy and hard to understand. The IDC study suggested that while key players in the spyware security industry are currently companies such as Webroot and PestPatrol, the large anti-virus companies will begin to provide spyware software to dominate the industry.

It was said by those involved in the study that McAfee has begun work on anti-spyware software and Norton is predicted to be following closely behind in those efforts.
Another unique characteristic of spyware is that removal tools do not detect all infections when a scan is performed because it is so diverse. Several different scanning tools will catch spyware that another tool did not. Persons from the IDC study predicted Norton and McAfee and similarly trusted and known anti-virus vendors will take over the spyware security because technology companies already have a relationship built with these companies and they will only want trusted spyware tool
vendors.

The IDC report officials also said spyware is most threatening to business because all their information and their customer's information can be stolen using spyware. Spyware also hinders a computer's functioning which in turn brings down a businesses productivity levels. Personal computer users are also concerned about private and possible harmful information being taken by spyware. Some recent news has also said that organized crime set ups have turned to spyware as a method for stealing information.

Article Source : www.articlecircle.com Author : Mitch Johnson

About the Author

Mitch Johnson is a successful freelance author that writes regularly for http://www.1st-in-spyware.com/ , a site that focuses exclusively on spyware removal software, as well as tips on how to prevent spyware from popping up on your computer. This site articles on has spyware guard, http://www.easy-spyware-killer.info/ as well as spyware scanner, http://www.easy-remove-spyware.info/

Internet Security Leaks!

The Internet is a place where people communicate at a very cheap price. It is where people now do their shopping, do business and trade in the financial market. This is why the Internet is considered as one of the most important tools in the new millennium.

Because of this, all your personal and financial information are stored in your computer, and also in your emails. If you do business in the Internet, important files will also be stored in your computer.

This is why there are people who take advantage of this technology to steal from hardworking and honest people. These people are called hackers and they often commit identity theft. They take control of your computer by putting spyware programs that can be acquired in the Internet.

Spyware works like inviting a stranger right in the comforts of your own home and letting him or her install surveillance equipments around your home. The thought of having a stranger looking at your personal and financial information could make anyone cringe.

This is why you should take all the necessary steps in preventing this stranger to have access to your computer in order to prevent them from stealing from you. Today, there are available software programs that enable you to protect yourself from malicious programs, such as viruses, spywares, and adwares.

One such program is developed by Norton. Norton is a company that specializes in computer security and is one of the most popular and most reputable companies in the world in terms of computer security. They provide one of the best quality software programs to protect you from these malicious software programs.

One of the latest developments of Norton Security by Symantec Corp. is the Norton Internet Security 2007. This particular program is still in development and is now available in Beta version. The reviews for this new kind of Internet security program prove to be promising and are considered as the new generation in online security.

Norton Internet Security 2007 offers one of a kind Internet security that will protect your computer from viruses, adware, spyware, hackers, and spam. All the necessary protection for your computer is integrated in the new software program offered by Norton.

Here are some of the features available in Norton Internet Security 2007:

Automatically filters spam and dangerous phishing emails.
Automatically removes Trojan programs, viruses, and worms.
Automatically blocks intruders, hackers, and identity thieves.

With all these features, you can be sure that your computer will be safe from malicious software programs circulating in the Internet today. It also has features that will automatically scan emails and instant message attachments for viruses, worms, and Trojan programs.

Although the Norton Internet Security 2007 is still in its Beta version, all the features from the previous version of Norton Internet Security is also integrated with the new Norton Internet Security 2007 and is also integrated with other features to make it easier for you to use it and also get more security when you surf the internet.

Norton Internet Security 2007 Beta version is now available for download online. However, it only has a one-day trial period and you wouldn't really get to try and test the full capabilities of this program. But with the positive reviews, you will see that it will be worth it to wait for the final release of the program and get yourself secured from viruses, adwares, spywares, hackers, and identity thieves.


Article Source : www.articlecircle.com Author : Daniel Millions

Norton: The Free Security Software You Need

Computer viruses are becoming so hard to battle. The more the technology becomes booming the more these viruses become more notorious. That is why these viruses are hard to handle.

Data in your computer run a great risk of being infected by these viruses. The malicious software that enters your computer without your notice will eventually destroy all your stored entries in your computer.

It will make your computer function slowly; you can no longer appreciate the benefits of your computer if you have it in your system. These are the most reason why you should purchase a program that will eliminate or prevent these viruses from entering your computer. How are you going to eliminate those?

It is so easy; there is much online software that you can use to avoid your computer from being infected. These programs must be of high quality to eliminate these irritating viruses in less than no time. The software is called anti virus.

Anti viruses are very specific programs that have all the needed tools to eliminate and prevent the entrance of different viruses to your computer. You only have to choose a kind with positive reputation. If you are looking for a good brand, you must try using the Norton anti Virus Software.

Norton anti virus software is the most famous brand for malicious software removal. When you talk about anti virus program, this will be the first brand to come in your way. The anti virus program becomes famous because of its affectivity. Aside from this, Norton is easier to use compared to other anti virus software.

It will take longer time to install the anti virus software but that user-friendly features of this program will be worth the wait. Most of the security test proves that Norton is one among the most effective security software available now.

The previous version of Norton AV has earned VB100percentage rating in the last sixteen-window test. It has received an award from VB100 ICSA in 2005. It has also passed series of tests in West Coast Labs.

Norton has the specific feature that scans download in all the search engines and applications over the Net. One of its most effective features is the segregation of the infected part downloaded from the safe data.

It will not show over your monitor and it will not download on your computer unless in has undergone filtering process in the hard disk of the CPU.

It also has this adware and spyware detection tools that will filter all the sites infected by those. It blocks the particular website before they enters your computer system.

Norton anti virus security software is free. There are many websites over Internet that gives free download of this particular software. However, you do not have to expect too much from the free download because some may offer a portion of its program only.

You need to spend more money to purchase the whole version of Norton anti virus software. Be patient enough and search for websites offering free downloads of the complete Norton anti virus system. You can use all the available search engines to help you locate the free download centers of this anti-virus software.


Article Source : www.articlecircle.com Author : S. Stammberger


About the Author

S. Stammberger is the editor of I Security Federation. Find out everything you need to know about internet and computer security. http://www.isecurityfederation.info

Spyware - now a problem for Mac users as well

Fortunately for the Mac users, the Adware and Spyware industry is still, as of 2005, heavily focused on the PC users. Adware and Spyware developers are particularly found of targeting PC users through DILLs and ActiveX controls, and can therefore only attack computers running Windows. This does not mean that Mac users are completely blessed from Spyware and Adware. There are several Spyware and Adware software capable of infesting Mac, and every Mac user should take a look at the Adware and Spyware removal programs available for mac. In 2005, Symantec caused a lot of hullabaloo in the Macintosh community when they warned the mac users about how the OS X operating system was rapidly becoming a target for virus developers and hackers. Symantec cautioned computer users not to relay on their mac alone to safe guard them from spyware infestations. You can no longer assume that you mac is immune from viruses and spyware. The need for free mac spyware removal programs available online is growing rapidly and we will hopefully see a lot of new free mac spyware removal programs on the Internet soon. Since Spyware is still a smaller problem for mac users, the number of available free mac spyware removal programs is currently much smaller than the number of free Spyware removal programs for PC.

When you choose among the available free mac spyware removal programs you should preferably pick one that is capable of scanning and removing both spyware and adware from your mac. A high-quality free mac spyware removal program will also be able to alert you every time an attempt to install spyware or adware on your mac is made. You should also ideally have the option to set the free mac spyware removal program to automatically block all such attempts without bothering you. Some of the free mac spyware removal programs will also protect your mac from several types of remote administration type applications. For maximal protection, you should combine your free mac spyware removal program with a good personal Firewall.

A new Spyware program designed to attack mac computers would probably spread rather slowly, since only around three per cent of systems in use today are using Mac OS. If a mac infected with spyware, or any other type of Malware, tries to spread the malicious software to a new computer, it will find a non-mac computer in 97 percent of the time. What everyone fears is therefore a hybrid Spyware capable of infecting Mac OS as well as Microsoft Windows. If, or rather when, such a hybrid is created it can spread very rapidly. Since many mac users still believe that their mac is immune to virus and spyware attacks, a lot of mac computers will become infected. All mac users are therefore recommended to take advantage of the available free mac spyware removal programs as soon as possible. One such program is available at http://macscan.securemac.com/ .

When you have installed your free mac spyware removal program, it is also important that you perform regular updates to make sure that you are protected from new types of spyware. Preferably choose a free mac spyware removal program that you can set to automatically search for updates and download them as soon as they are available. Check the fine print when you choose your free mac spyware removal program. A free mac spyware removal program where the regular updates cost a lot of money will soon turn out to be a very expensive “free” program. Some free mac spyware removal programs do not allow you to get updates, or will limit the number of updates, until you have bought a non-free version of the free mac spyware removal program.

Article Source : www.amazines.com Author : JASON FROVICH

About The Author:

New forms of malicious Spyware and Adware are constantly created and in order to protect your computer from infestations you must choose a high-quality program and keep it updated. Supportcave.com offer all this and more.

Virus's, Trojans and Spyware...Oh My!

Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won’t boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. In fact that’s how I started in the computer business. I didn’t want to pay someone to fix the problems that I usually caused. A little voice in my head told me “I can build a computer, it doesn’t look that hard!” Six years later, and a lot of dead computers in the beginning, have placed me where I am now. Let me tell you, it’s a full time job, even when I’m not at work. There is always some new technology being developed, and of course security is a never-ending battle with new viruses, trojans and spyware daily.

The internet is full of how-to information. You can learn everything from how to make the perfect loaf of bread, tune your car, or remove a virus. Making a loaf of bread seems to be easy, and it probably is. Even if you end up making flat bread or burnt bread, you’re not out a lot of money or in too much trouble. On the other hand, if you try to tune your car and break a spark plug or put the wires back incorrectly, it could end up costing you a lot more to fix it. All you wanted to do was save a few bucks and do it yourself. I’ve burnt bread and I’ve tried to fix my own car. The bread was thrown in the trash, the car I ended up taking to an auto mechanic and having it fixed right, which of course cost me much more than money, it cost me time.

You must be wondering what my point is. Yes, removing a virus or building a computer isn’t really that hard of a task…if you live and breathe computers like I do and others do (we affectionately call ourselves Geeks). Let’s take a look at the following scenario.

James is a real estate broker, and a damn good one. He makes his living helping people find the best buy for their dollar. As a result James keeps an extensive client list on his computer. Somewhere along the line he manages to pick up a nasty Trojan. His anti-virus software caught it but was unable to clean it. He does some research online and finds a site that explains how to remove the Trojan. After following the instructions he reboots his PC only to find that his machine will not boot. In frustration he goes to another computer and looks up information on boot problems and finds out that the best thing he can do is reformat his hard drive and re-install his operating system from his backup. Oh, by the way, he hasn’t done a backup in over 6 months. By this time he has spent 4 or 5 hours trying to fix the problem, and now has the daunting task of re-installing his operating system without any backup…

The moral of the story here is that he literally wasted hours that he could have spent making a sale or helping a client purchase a house or land. Is the above scenario a little extreme? In some ways it is, but it doesn’t fall too far from the truth. Many of the clients I see with virus or spyware problems have tried everything they can to remove the problem, only to find out they spent hours with no results, and often come out worse than they were. By the time they come to see me they are frustrated and just want it fixed. Unfortunately, this does cost them money that they didn’t want to spend in the first place, and more importantly in this day and age, it costs them more time. Time is the great equalizer. If James had been able to make a 10% percent commission on a $200,000 house, spending the 65 to 100 dollars to clean his computer wouldn’t have seemed very significant.

Nine times out of ten an infected computer does require a reformat and re-install. I don’t say this lightly. It is usually much easier to backup and start over than spend hours trying to find every little piece of nastiness that was installed on your computer.


Article Source : www.amazines.com Author : ERIC GRAVES

How to Choose Virus-Protection Software

Most new consumer model and major brand mail-order computers include good anti-virus programs. But if you use the Internet or share files and you don't have one, you definitely need one.

Steps:

1. Buy one of the leading anti-virus programs, such as Symantec's Norton Anti-Virus, McAfee VirusScan, Quarterdeck ViruSweep, or Dr. Solomon's Anti-Virus. The major developers can be relied upon to release timely periodic updates that deal with new viruses.

2. Check reviews and ratings on the Internet and in computer magazines to narrow your buying decision.

3. Download a shareware anti-virus program if you cannot afford an effective commercial anti-virus program.

4. Spend no more than $50 for a commercial anti-virus program.

5. Evaluate the terms for frequent upgrades to your program before buying. Most manufacturers offer free upgrades that detect newly created viruses.

Anti-virus programs are often bundled with other utilities and applications, offering a discount from buying the programs separately.

Keep your anti-virus program current to prevent your computer from becoming infected by newly created viruses. Criminals are constantly devising ways to damage computers with viruses.


Article Source : www.amazines.com Author : ANDREI VACARASU

Anti-virus software comparison Test

Virus.gr tested quite a few different software companies to see how they would stack up against each other. How did the 147,000+ virus test pan out? Here are the results:

1. Kaspersky version 6.0.0.303 - 99.62% 2. Active Virus Shield by AOL version 6.0.0.299 - 99.62% 3. F-Secure 2006 version 6.12.90 - 96.86% 4. BitDefender Professional version 9 - 96.63% 5. CyberScrub version 1.0 - 95.98% 6. eScan version 8.0.671.1 - 95.82% 7. BitDefender freeware version 8.0.202 - 95.57% 8. BullGuard version 6.1 - 95.57% 9. AntiVir Premium version 7.01.01.02 - 95.45% 10. Nod32 version 2.51.30 - 95.14% 11. AntiVir Classic version 7.01.01.02 - 94.26% 12. ViruScape 2006 version 1.02.0935.0137 - 93.87% 13. McAfee version 10.0.27 - 93.03% 14. McAfee Enterprise version 8.0.0 - 91.76% 15. F-Prot version 6.0.4.3 beta - 87.88% 16. Avast Professional version 4.7.871 - 87.46% 17. Avast freeware version 4.7.871 - 87.46% 18. Dr. Web version 4.33.2 - 86.03% 19. Norman version 5.90.23 - 85.65% 20. F-Prot version 3.16f - 85.14% 21. ArcaVir 2006 - 83.44% 22. Norton Professional 2006 - 83.18% 23. AVG Professional version 7.1.405 - 82.82% 24. AVG freeware version 7.1.405 - 82.82% 25. Panda 2007 version 2.00.01 - 82.23% 26. Virus Chaser version 5.0a - 81.47% 27. PC-Cillin 2006 version 14.10.1051 - 80.90% 28. VBA32 version 3.11.0 - 79.12% 29. ViRobot Expert version 4.0 - 76.22% 30. UNA version 1.83 - 75.44%

On the top you see both Kaspersky and Active Virus Shield with same results, thats because the engine is the same, it`s just AOL brand name on free software. This is good news, as people get good software for free! You can download Active Virus Shield by AOL here.

Of course the test is not precise, as it is always sponsored by some company (this one really looks like AOL and Kaspersky sponsored one, it`s too optimistic 99.62%).Kaspersky has created a large community around the world to support it. I`ve seen some other results where at top is Dr.Web. Dr.Web best feature is that it can cure infected files, not just delete them (e.g. delete important system files and crash your system). That`s what I never liked about NOD32 - it could never cure any file!

Another thing that makes me curious about this test is that Kaspersky`s big competitor Norton is put down in the 22nd place. In another review Norton is stated one of the worst applications that slow down your computer. And I agree, it IS slow. It`s installation procedure uses some Internet Explorer stuff that I have always had problems with.

For now at work I have Norton Internet protection suite 2006 (I`m without admin privilegies) and on my laptop I have deactivated Dr.Web and activated AntiVir, because one nasty virus Dr.Web couldnt catch and Antivir just detects it, but still cannot cure. I plan to install AOL (Kaspersky) Antivirus suite and try it out, maybe things have changed over time.

Anti-virus software comparison Test by INFOSECURITYLAB INFOLAB

Norton Internet Security 2007: the New Generation in Internet Security

The Internet is a place where people communicate at a very cheap price. It is where people now do their shopping, do business and trade in the financial market. This is why the Internet is considered as one of the most important tools in the new millennium.

Because of this, all your personal and financial information are stored in your computer, and also in your emails. If you do business in the Internet, important files will also be stored in your computer.

This is why there are people who take advantage of this technology to steal from hardworking and honest people. These people are called hackers and they often commit identity theft. They take control of your computer by putting spyware programs that can be acquired in the Internet.

Spyware works like inviting a stranger right in the comforts of your own home and letting him or her install surveillance equipments around your home. The thought of having a stranger looking at your personal and financial information could make anyone cringe.

This is why you should take all the necessary steps in preventing this stranger to have access to your computer in order to prevent them from stealing from you. Today, there are available software programs that enable you to protect yourself from malicious programs, such as viruses, spywares, and adwares.

One such program is developed by Norton. Norton is a company that specializes in computer security and is one of the most popular and most reputable companies in the world in terms of computer security. They provide one of the best quality software programs to protect you from these malicious software programs.

One of the latest developments of Norton Security by Symantec Corp. is the Norton Internet Security 2007. This particular program is still in development and is now available in Beta version. The reviews for this new kind of Internet security program prove to be promising and are considered as the new generation in online security.

Norton Internet Security 2007 offers one of a kind Internet security that will protect your computer from viruses, adware, spyware, hackers, and spam. All the necessary protection for your computer is integrated in the new software program offered by Norton.

Here are some of the features available in Norton Internet Security 2007:

• Automatically filters spam and dangerous phishing emails.
• Automatically removes Trojan programs, viruses, and worms.
• Automatically blocks intruders, hackers, and identity thieves.

With all these features, you can be sure that your computer will be safe from malicious software programs circulating in the Internet today. It also has features that will automatically scan emails and instant message attachments for viruses, worms, and Trojan programs.

Although the Norton Internet Security 2007 is still in its Beta version, all the features from the previous version of Norton Internet Security is also integrated with the new Norton Internet Security 2007 and is also integrated with other features to make it easier for you to use it and also get more security when you surf the internet.

Norton Internet Security 2007 Beta version is now available for download online. However, it only has a one-day trial period and you wouldn’t really get to try and test the full capabilities of this program. But with the positive reviews, you will see that it will be worth it to wait for the final release of the program and get yourself secured from viruses, adwares, spywares, hackers, and identity thieves.
income or not.


Article Source : www.articlesbase.com Author: John Ugoshowa

Norton Internet Security : Giving You the Protection You Need

The internet today is filled with malicious programs that can eventually destroy your computer files or let some stranger take a look at your files and copy it without you knowing about it. These malicious programs are very dangerous programs because you will be letting someone in and take a look at all your personal information in your computer and use it against you by committing a very serious crime called identity theft.

They will be able to use your personal and financial information that you store in your computer to steal from you. You can even compare it to letting someone in your house and install surveillance equipments without you even knowing about it. It would also be like giving away your credit card to a stranger without even knowing you gave away your credit card information.

This thought can make anyone using the internet cringe and leave them sleepless at night thinking about how secure the transactions were when you were using the internet to purchase your groceries.

Because of this, you will need a program or software to protect yourself from the growing threats of viruses, worms, and other malicious software circulating the internet today. It is a fact that more and more malwares are being developed and being released everyday in the internet. This is why you need to take the necessary steps in making your computer safe from these new kinds of threats.

You have to remember that the internet is meant to be fun. It is meant to connect people from all over the world in a single community. It shouldn’t be something that you should fear every time you open your email or every time you download something in the internet. This is why you need an internet security program to protect you from these malwares and give you some peace of mind when surfing the internet and not worry about things like hackers, spywares, viruses and other malicious software anymore.

The Norton Internet Security 2004 is one of the best internet security software ever developed. It provides great protection against malicious software and other features that will allow you to surf the internet without even worrying about the threats in the internet.

With the Norton Internet Security 2004, you will have more confidence in surfing the web. You will enjoy emailing your friends and family, or download different files over the internet with the thought of your computer secured from the virus and other malicious software threats circulating the internet today.

Although there are newer versions of Norton Internet Security, the Norton Internet Security 2004 is a proven program that is sure to protect you with the different new threats popping out in the internet in a daily basis. You should consider that your computer should never be without the Norton Internet Security 2004 edition.

The Norton Internet Security 2004 from Symantec is integrated with different programs that will protect you from the latest viruses popping out the internet, from hackers, from spywares, from adwares, from spam emails, from phishing emails and other malicious software existing in the internet today. It also offers real-time updates for the software to provide you better protection for your computer by updating virus and other malicious software definitions.

With Norton Internet Security, you will be providing shield for your computer when accessing the internet. It will effectively protect your computer against the different malicious software in the internet today.

Article Source : www.easyarticles.com About the Author: John Ugoshowa

Wednesday, August 29, 2007

Norton Internet Security 2007: The New Generation in Internet Security

The Internet is a place where people communicate at a very cheap price. It is where people now do their shopping, do business and trade in the financial market. This is why the Internet is considered as one of the most important tools in the new millennium.

Because of this, all your personal and financial information are stored in your computer, and also in your emails. If you do business in the Internet, important files will also be stored in your computer.

This is why there are people who take advantage of this technology to steal from hardworking and honest people. These people are called hackers and they often commit identity theft. They take control of your computer by putting spyware programs that can be acquired in the Internet.

Spyware works like inviting a stranger right in the comforts of your own home and letting him or her install surveillance equipments around your home. The thought of having a stranger looking at your personal and financial information could make anyone cringe.

This is why you should take all the necessary steps in preventing this stranger to have access to your computer in order to prevent them from stealing from you. Today, there are available software programs that enable you to protect yourself from malicious programs, such as viruses, spywares, and adwares.

One such program is developed by Norton. Norton is a company that specializes in computer security and is one of the most popular and most reputable companies in the world in terms of computer security. They provide one of the best quality software programs to protect you from these malicious software programs.

One of the latest developments of Norton Security by Symantec Corp. is the Norton Internet Security 2007. This particular program is still in development and is now available in Beta version. The reviews for this new kind of Internet security program prove to be promising and are considered as the new generation in online security.

Norton Internet Security 2007 offers one of a kind Internet security that will protect your computer from viruses, adware, spyware, hackers, and spam. All the necessary protection for your computer is integrated in the new software program offered by Norton.

Here are some of the features available in Norton Internet Security 2007:

• Automatically filters spam and dangerous phishing emails.
• Automatically removes Trojan programs, viruses, and worms.
• Automatically blocks intruders, hackers, and identity thieves.

With all these features, you can be sure that your computer will be safe from malicious software programs circulating in the Internet today. It also has features that will automatically scan emails and instant message attachments for viruses, worms, and Trojan programs.

Although the Norton Internet Security 2007 is still in its Beta version, all the features from the previous version of Norton Internet Security is also integrated with the new Norton Internet Security 2007 and is also integrated with other features to make it easier for you to use it and also get more security when you surf the internet.

Norton Internet Security 2007 Beta version is now available for download online. However, it only has a one-day trial period and you wouldn’t really get to try and test the full capabilities of this program. But with the positive reviews, you will see that it will be worth it to wait for the final release of the program and get yourself secured from viruses, adwares, spywares, hackers, and identity thieves.
income or not.

Article Source : www.easyarticles.com Author : John Ugoshowa

Keep Secure Your Apple Computer

Researchers and engineers who are working in the security field must have strong constitutions—especially when it comes to weathering negative backlash and tired conspiracy theories whenever apple security and Mac OS X are mentioned in the same breath.

The term “virus” is used so often as a generic reference to any malicious code that here at Symantec we tend to use more appropriate blanket terms like "security threat" and “malicious code.” Just how bad is the misuse of the term virus?

Apple security exploits cropped up and have received a lot of attention.

The first vulnerability involved the Leap. Like so many other worms, Leap.A relied on tricking users into downloading and opening a suspicious file. If you ignore file attachments that you don't expect or that look suspicious, you'll protect yourself from the vast majority of Internet crud, especially the kind that arrives via e-mail.

Like so many other worms, Leap.A relied on tricking users into downloading and opening a suspicious file. If you ignore file attachments that you don't expect or that look suspicious, you'll protect yourself from the vast majority of Internet crud, especially the kind that arrives via e-mail. The worm, known as Inqtana.A, exploited a hole in the Bluetooth software in OS X 10.4 that had been patched last year. Inqtana. Keep your operating system up-to-date and don't accept unknown files, whether they come to you in e-mail, iChat, or beamed from someone's Bluetooth phone.

The next one is a vulnerability in Apple's browser Safari, had the most potential for damage. By default, Safari is set to automatically open "safe" file types, such as movies and music, after they've been downloaded. Before Apple closed this hole, malicious scripts could be disguised as an innocuous file type and set to automatically run upon download. Unchecking the "Open 'safe' files after downloading" box in Safari's General Preferences pane also closes the security hole. Browsers other than Safari were not affected.

Hackers who want your passwords and credit-card numbers don't care whether you're using a Mac or a PC. Either way, if you use a Wi-Fi network, you're making their task easier. You should definitely enable whatever encryption your home network supports, be it WEP or WPA. This prevents unauthorized users from hopping onto your network and possibly snooping on your communications and getting into your hard drive.

Sharing Option: Use your firewall to close off access to all the ports that you don't need open, including file sharing. You might also consider password-protecting or encrypting all or some of your hard drive.

Confidental Documents: If you don't want someone grabbing your financial data out of the air, save your Internet shopping and banking for your secured home network.

Shoulder-Surfing. Snooping doesn't always require high-tech gear. As I just mentioned, it's unwise to work on super-secret company plans in public--but if you must, be aware of what's going on around you.

Wi-Fi Technology: Whenever you don't need it, turn off your Wi-Fi card. You'll block access to your laptop and conserve battery life.

Security Updates are also available for software released independently from Mac OS X. For example, Security Update 2005-002 is only available for systems containing the vulnerable version of Java 1.4.2. Software Updates are packaged in a manner to keep systems secure. Security Updates are only offered to systems that need the update, and not to later versions that have incorporated the Security Update.

Welcome to our Apple Computer & Parts Section.
http://www.applepart.com
http://www.idigitals.com

Here you’ll find all the various used Apple computer models that are currently available, as well as our inventory on Apple computer parts. Here you find how your apple computer safe from virsus and spam.They have offered to systems that need the update, and give the latest versions that have incorporated the Security Update.

The internet is the best place to buy cheap computer parts and take it secure. Due to increase in demand for many parts in many suppliers find it profitable to sell their products online. The online dealers have their websites, which offer information on the various types of Mac parts available for purchase. Go to http://www.Applepart.com, a leading online resource for buying Apple Parts. Applepart.com is the online catalog for Apple Parts ..

Article Source : www.easyarticles.com Author: Nivea David

Mac Security Alert for Computer Viruses and Vulnerabilities

Freedom’s not just another word for nothing left to lose. Strong security ensures your ability to conduct your business unhampered. Mac OS X delivers the highest level of security through the adoption of industry standards, open software development and wise architectural decisions. Combined, this intelligent design prevents the swarms of viruses and spy ware that plague PCs these days.

Knowing security is important. Most people are blinded by the word 'security + Mac' your current security program probably is not secure the way it should be for your office, school, internet, or even home. I hope you learn more from this article then you have ever known about Macintosh security.
The time between the disclosure of vulnerability and the release of an associated exploit was just six days. Half (59 per cent) of vulnerabilities were associated with web application technologies.
Along with computer viruses and vulnerabilities, spam remains a leading security concern. Spam accounted for 61 per cent of all email traffic in the first half of 2005, according to Symantec, with over half (51 per cent) of all junk mail received worldwide originated in the US.
MacScan 2.2 spy ware protection for Mac OS X has been released and is available for download as a free upgrade. This version improves scanning of spy ware, definition updates, improved stability and support for 10.2.

Apple Security Update 2006-004 has been released. To update Mac OS X go to the System Update Controls in the System Preferences and check for updates. Update includes fixes for AFP Server, Bluetooth, Bom, and DHCP; fetch mail, gun zip, Image RAW, ImageIO, Launch Services, OpenSSH, telnet, Web Kit, and App Kit.

Mac OS X Virus Alert - Sophos Anti Virus has found the first 'real virus' for Mac OS X known as OSX/Leap-A or OSX/Oomph-A. The OSX/Leap worm or Trojan is spread via instant messenger forwarding itself as a file named 'latestpics.tgz'. When launched the worm attempts to spread via iChat sending itself to the users buddy list. The application will also try to infect the recently used applications.

Apple QuickTime/iTunes QuickTime.QTS Heap Overflow was addressed by Apple, this issue could allow for malicious code to be executed when processing a malformed .MOV (movie) file. Apple has released updated QuickTime and iTunes. Advisory with example code.

MacScan 2.0 for Mac OS X has been released. MacScan will find, isolate, and remove spy ware, keystroke loggers, and Trojan horses as well as detect whether remote administration applications have been installed on a computer. By scanning files received as e-mail attachments or downloaded from the web, MacScan can proactively protect computers from inadvertently accepting new spy ware. Mac Scan’s spy ware definitions are constantly being updated, letting users keep pace with the hackers.

Mac OS X and Mac OS X Server contain a security hole in Directory Services which allows for escalation of privileges and denial of service attack which is fixed with the 10.2.5 update. Directory Services is part of the operating systems information services subsystem, and is launched at being setuid as root by default.

Mac OS X systems with 'allow remote login' enabled in the sharing pane of the system preferences should be disabled until a new release of OpenSSH has been made available from Apple in the security updates. View advisory now a new version of the software is out but not available through the Apple Software Updates.

Protect the info on your Mac from prying eyes with File Vault, which uses the latest government security standard, AES-128 encryption, to safeguard your hard work. It encrypts and decrypts on the fly, so you don’t even know its happening. File Vault protects all the info in your home folder from prying eyes, so your trade secrets stay secret, your holiday shopping lists are kept safe and your personal finance records remain secure.
Welcome to http://www.dvwarehouse.com, a site devoted to Apple Macintosh security and Mac OS X Security! Use the Side Bar to navigate the site, check this page frequently for updates and new security products for the Mac OS!
This page provides links to background information, security vendors, comparative and individual reviews of personal firewall, anti-virus, anti-spam, privacy and suites of software as well as hardware firewalls and anti-theft services to help you protect your Macintosh desktop or laptop computer.

Go to the Following Mac Sites:

http://www.dvwarehouse.com
http://www.macmart.com
http://www.sellamac.com

They will constantly update it with the most current programs, news and downloads. If you are a programmer for the Mac, please contact us, we are looking to make a program. Email macmart.com for more information.

Article Source : www.easyarticles.com Author: Nivea David

How to Secure Your Computer

According to a Software security and Antivirus company Symantec, it only takes 20 minutes for an unprotected computer to be attacked once it gets connected with the internet. Computer security cannot be compromised because if your computer is insecure then all your data, software and hardware are at risk. There are several methods that are used to combat with the security threats. The known threats to a computer are viruses, spyware, adware, malware, Trojan horses, internet security threats, accidental files deletion and data corruption, unauthorized access to compute and the hackers’ attacks. Following tips tells that how to deal with the computer security threats.

Install Up-to-dated Antivirus Program

One of the most important security step and preventive measure is to install an up-to-dated antivirus program and scan your computer regularly with it. An antivirus programs acts as protective shield for your computer against the virus, spyware and other internet threats.

Install Firewall

A firewall is a protective boundary that protects your computer from the unauthorized access and from the hackers’ attacks. If you haven’t enabled a firewall software or hardware on your gateway computer then anyone can get into your computer.

Install Anti spyware

Installing a good anti spyware program eliminates the chances of data corruption, Windows registry corruption, slow computer booting, browser’s hijack and applications failure. The combination of Antivirus + Anti Spyware + Firewall program is a very good choice.

Update your operating system with service packs and patches

Services packs and the security patches fix the security holes and other vulnerabilities in the operating systems. If you are using Windows based operating system then there is automatic update option in the control panel of the Windows and you can set schedule updates of the operating system from the Microsoft’s website.

Beware of suspicious emails and attachments

Suspicious emails and email attachments is a very common cause of the viruses. The best safety measures it not to open the suspicious emails from the unknown source.

Uninstall Unnecessary Programs

For getting the optimized performance from your computer, uninstall all the unwanted programs and delete temporary internet files. You will notice increased performance of your computer.

Deploy Encryptions

Another important security measure is to prevent your important files with the encryption. Also for protecting your important data from accidental deletion, make your files to read only.

The above mentioned tips provide the best safeguard against the known offline and online threats.

Article Source : www.easyarticles.com Author : B. Bashir

About the Author: B. Bashir manages Networking Tutorials and regularly writes articles on various topics such as Computer Networking, OSI Model Layer Wireless Networking, Computer Hardware, Certifications, How Tos, Introduction To ATM Network and Computer tips.

Useful Tips and Tricks to Surfing the Web for Search Terms

The internet is a pretty big and scary place for someone new to it. It can also be quite intimidating for a person just getting started with it and needing to find information. There all sorts of questions you are left wondering as you stare at that computer screen. Where do you start? What should you be looking for and how do you look for it in the first place? That is where the search engines come in.

The search engines are a great place to start off any search inquiry. Even the most advanced and skilled internet user starts their inquiries with one of the search engines. Although the search engines and directories each have their own unique and subtle differences, there are a few basic search commands each share in common.

These command tips, while seemingly generic, will greatly increase your chances of finding the answer to whatever search questions you may be asking. Don't be afraid to try new methods; experiment a little with your Web search strings and see what happens. Here are some basic tips and guidelines for you to follow as you get started.

* Keywords – The basic premise is to try and keep it simple. Use narrowed down keywords when trying to find something through a search engine. It will prove to be a more successful than randomly picking out a search term that vaguely has something to do with what you are trying to find. For example, if you were searching for news on a car crash, you'd end up with more results back than you could possibly use; however, if you narrowed that down to a search on local car crashes in your local area you’ll be more successful.


* Phrases – Put your search inquiry in quotes in if you're looking for an exact phrase. If you don’t, there is a chance the results will come back with a huge number of unneeded results. Use "short haired dogs” as an example. The search results for that inquiry will come back with these three words in proximity to each other and in that specified order.


* Use negative keywords - Broaden or narrow your work by using negative keywords. For example, you are searching for articles on government bonds, but all you get is results for Barry Bonds. Simply combine a couple of search engine basics to get your intended results: "government bonds" -Barry. Now your results will come back without all those articles about baseball.


* Wildcards – Try to use "wildcard" characters for a broader search in most search engines and directories. These wildcard characters include *, #, and ?, with the asterisk being the used the most. Apply wildcards when you like to broaden your search. For example, if you are looking for sites that discuss racing, don't search for race, search for race*. This will return pages that contain the word "race" as well as pages that contain "races", "racing", "race enthusiasts", "racing circuits", and etc.


* Don't Give Up - If you're just starting out learning how to use the internet, stick to it and don’t get frustrated. It is easy to become overwhelmed information overload that is available to you, especially when you're searching for something very specific. Keep trying, and don't be afraid to try different search engines, search phrase combinations, or different search techniques.


* Guess – Take a shot and make an educated guess about the location of a particular site if you some basic knowledge of how a site’s URL is constructed. For example, commercial sites use an ending of “.com", college and university sites use “.edu”, and non-profit organizations normally try to stick with “.org”.


Article Source: http://www.ArticleBiz.com Author : Bill Healey

The Internet: The Latest Form of Addiction?

If you spend hours of your time on the Internet, you may be an Internet addict. Find out what you can do about your online addiction and how you can balance your online life with your life outside of cyberspace.

Internet-Related Addictions

In my travels through cyberspace, I have noticed an increasing number of websites and blogs discussing various forms of Internet-related addictive behavior. In fact, I have recently encountered the following online dependencies: porn, gambling, video games, comment addiction (i.e., checking the comments on one's blog), Internet addiction, blog addiction, Technorati addiction, forum addiction, information addiction, MySpace addiction, and addiction to Bloglines.

This inventory is obviously not an official list gathered from the medical or psychological literature. It is interesting to note, however, that Internet users themselves are the ones labeling their online behavior and the online behavior of others as "addictive."

How Dangerous are Internet Addictions?

While the more "typical addictions" such as alcoholism and drug dependency are more established regarding the various forms of treatment and therapy that are available, employed, and researched, other dependencies, such as the above mentioned Internet-based addictions, are not. The question, however, needs to be asked: how serious are Internet addictions? To help answer this question, consider the following statement made by researchers at the Stanford University School of Medicine in a recent study on Internet addiction: "The United States could be rife with Internet addicts as clinically ill as alcoholics."

Addiction Horror Stories

Even though most of the addiction horror stories I have read about pertain to the more "typical" dependencies such as alcoholism, drug addiction, and substance abuse, other Internet-related dependencies such as "game addiction" are starting to share the headlines. For instance, there's various stories circulating the Internet about teens and young adults who play online video games 18 or more hours per day.

As disconcerting as this is, the most shocking and disturbing Internet-based addiction story I have heard so far is the following. In 2005, a 54-year-old male, unable to take a break from his online world, died from starvation. How is this possible you ask? Easy. For 7 weeks before his death, he posted comments into one forum after another every 30 seconds, while refusing to eat.

What Can Be Done?

What can a person do who is addicted to the Internet? Among other things, take a break, go outside, and enjoy life. If you think that this is a rather simplistic suggestion, please continue reading.

I remember hearing about a person who complained to his therapist about being depressed and "stuck in a rut" for many years. After listening to her patient ramble on for weeks about his drab, meaningless, and unexciting existence, it came time for the therapist to advise her patient what to do. On the day of reckoning, the therapist calmly smiled at her patient and said: "on a consistent basis, you need to get some sleep and spend some quality time outside in the sun." Upon hearing this, the patient understandably felt "cheated" with such a "simple solution."

The point: sometimes we make things so complex and complicated that we become caught in a cycle of "paralysis by analysis." Clearly, with a more traditional form of therapy such as years of psychoanalysis, the patient described above may have finally "understood" why he had been depressed and "stuck in a rut." Perhaps based on this "insight" he may have started to live his life more honestly, more fully, and with more joy. On the other hand, this same patient might have viewed his world in an entirely different way had he started living in a more healthy manner and developed some quality interests, relationships, and hobbies.

Conclusion

I think we have to learn how to balance our online lives with our lives outside of cyberspace. Sadly, many people engrossed with the Internet haven't learned this and have, as a result, become so enamored with their online activities that their lives, especially their relationships, have become dysfunctional. Realizing this, however, leads to perhaps an even more penetrating question: have our lives become so devoid of meaning that we get hooked on the first thing that seemingly fills this void? If this question is even partially on target, then it is indeed a sad commentary on our "enlightened" society.


Article Source: http://www.ArticleBiz.com Author : Denny Soinski

Denny Soinski, Ph.D, writes about alcohol abuse, alcoholism, alcohol recovery, and alcohol treatment. For more info, please visit http://www.alcohol-recovery-info.com right away! Copyright 2007 - Denny Soinski. All Rights Reserved Worldwide.