Ads 468x60px

Search Engine

Loading
Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

Friday, 27 January 2012

How to Installing Symantec Endpoint Protection 12.0 for Windows



Step-by-step instructions on how to install Symantec Endpoint Protection for Windows.

Symantec Endpoint Protection Setup Manual
If there is other antivirus software they should be uninstalled before installing Symantec EndPoint Protection Software. Otherwise, Different Antivirus software can detect definition files of other software as a threat that can create some problems. 

First of all if you have Zip file. Extract it now as showing you in listing

Sunday, 18 December 2011

How to Use Public Computers? How to safe account Information from Public Computers?


Public libraries, Internet cafes, and other customer-serving establishments have their own computers that customers may use to access the Internet. Are these computers safe for you to use?

Tales abound of public-access computers infected with viruses, spyware, and even key loggers, many deliberately planted there in order to elicit information from unsuspecting users. I recall specifically in 2004 a case where a person was arrested for installing a key logger program on a computer in a well-known copy services store in order to record users’ bank account numbers and passwords. This is technology gone awry.

Saturday, 10 December 2011

Saving Your Software’s License Information


Nearly every time you purchase software — whether you get it from a retail store, have it shipped to you, or purchase a downloadable version — you have to deal with license codes (also called license keys) to make the product work. Sometimes license keys come on little stickers in the packaging, other times they are printed on the CD. They might be e-mailed to you, found on a Web page, or even read to you over the phone.

Monday, 19 September 2011

Computer Performance (The reason why computer slow)


Within days of setting up your new computer it seems it gets slower and slower! There are many reasons why this happens. Every time you install a new piece of software your computers operating system has more to deal with. Some software is poorly written or installs other software you don't need, putting additional burden on your computers precious resources. But even worse, the moment you connect your computer to the Internet, or World Wide Web, your system became an open target for things that are not so simple to deal with. What if your computer is being used for some other purpose by someone else?
It’s been about three weeks since you setup your new computer and it seems like it's not as fast as it was when you first set it up.  In a couple of months, after installing various software, browsing  on the Internet, uninstalling software, and dealing with a virus or two, your system seems to be much slower.
Well, this is something pretty much everyone deals with.  Quite a few of my friends ask me how I keep my computer running so well.  In fact, many of my friends and associates have newer computers than mine, but mine still seems to run faster than theirs.

Sunday, 28 August 2011

Is My Computer Safe From Hackers


A good friend of mine called me one day and told me his computer was running particularly slow and the odd thing was it was worse in the evening. I took a look at his computer and found that someone had got into it and was storing large (I mean Large) amounts of Pornography, Stolen Software, Music and Videos, on it. Most "Hackers" are not looking to do something to your computer that you will immediately be aware of. They are looking for what is called "staging areas" where they can store things for distribution or later use. Can you imagine how my friend felt once I showed him what was on his computer! This happens all the time. There are organizations out there who are paid by the Entertainment Industry, the Government, and other institutions who are looking for this type of issue. If they locate these things on your computer, trying to prove that you had nothing to do with it could be a pretty difficult thing to do.
Are My Computers Safe From Hackers? 
The meaning of the term "HACKER" has really changed over the years.  Early on anyone who was

How to Keep Your PC Safe From Hackers


Consumers and politicians alike have been appalled by the prospect that Apple has the ability to keep tabs on users’ location via a hidden iPhone file. The furor may distract from more nefarious threats, though. Industry experts say that last year there were 286 million types of malware responsible for more than 3 billion attacks on computer users, while the software guarding against those attacks generally catches only 60% of what it comes up against. Although there may be no 100% guaranteed strategy for beating hackers and stopping snoopers, there are some simple safeguards to put in place:
Focus on security
Every day, millions of people post online pictures of their kids, vacations and family events. Most are unaware of the wealth of data that can easily be extracted.

Wednesday, 10 August 2011

Why Ubuntu is the Best Linux Operating System

Linux is an "open source" operating system, meaning that it can be modified and distributed freely. Because of this fact there are hundreds of Linux distributions in circulation and Ubuntu is quickly becoming one of the world's most popular operating systems.
Different people have different opinions of each of the Linux distributions. Many feel that the official Linux distribution by Red Hat Software is the best Linux operating system, while others believe Ubuntu is the best Linux distribution. I personally believe that Ubuntu is the most efficient and most reliable of the GNOME desktop operating systems in circulation, for three reasons:

Five Tips to Protect Your Computer from Viruses

Viruses, Malware and Trojans are a serious threat to the health of your PC.
At the very least, viruses and malware are a nuisance, but they can mean a total reinstall of your operating system and all your applications. Some viruses have even been known to ruin hardware. For example, the virus Chernobyl wiped out my motherboard, costing me time and money. Trojans can allow hackers to take over your system, steal your data and attack other people.
So, how do you protect yourself from all the nasty viruses, malware, and trojans out there on the internet? The only sure-fire way is to disconnect from the internet, but since that is not practical, here are a few tips to help protect your PC.

Monday, 8 August 2011

Acronis Disk Director 11


Acronis Disk Director 11 Home is an all-new version of the most feature-rich disk management product available. If you're serious about maximizing disk use and data safety, it's never been easier to create hard disk partitions or resize, move or merge partitions without data loss.
Acronis Disk Director 11 Home includes powerful new features like Windows 7 support, Dynamic Disk and GPT disk support, spanning a volume across multiple disks and much more.
Acronis Disk Director 11 Home brings together the most valuable disk management functions and partition recovery tools in a single powerful package:


- Partition Management
A comprehensive array of expert-level features gives users the control they need to maximize disk use. You can merge, split, resize, copy, and move partitions without losing data. It also lets you quickly reorganize a hard drive's structure.
- Acronis Recovery Expert
Acronis Recovery Expert is a highly reliable data partition and disk recovery tool that prepares you to tackle and repair the results of a personal error, hardware or software failure, virus attack or hacker's intrusive destruction, fast.
- Acronis OS Selector
Acronis OS Selector allows you to install multiple operating systems on one computer. You can boot an operating system from any partition on any hard disk or have several multiboot systems on the same partition. It's easy to use and fast.
Here are some key features of "Acronis Disk Director 11 Home":

New! Full Windows 7 Support:
· Acronis supports all Windows operating systems back to Windows XP.

Resize, split and merge volumes:
· It's easy to adjust a volume's size, break it up or merge volumes with no loss of data integrity, and no need to reinstall operating system and applications.

Create, convert, copy and move volumes:
· Make adjustments more easily than is possible with built-in disk management tools.

Install multiple operating systems on one PC:
· Try new operating systems without impacting your current system with Acronis OS Selector.

New! Add/break mirrored volumes :
· Adding mirrored volumes builds redundancy for greater fault tolerance.

New! Use with Acronis True Image Home 2010:
· When used with Acronis Disk Director 11 Home, it provides comprehensive partition management and system protection

Clone disk to a replacement HDD:
· No need to spend hours installing your old disk's operating system and applications. Disk cloning returns you to action on the new disk in just minutes.

New! Dynamic disk support :
· Using Partition Management, carry out volume resizing, copying and other functions you'd perform with basic disks on Dynamic Disks too

New! Convert basic disk to dynamic and vice versa:
· As your requirements change, you can quickly convert between basic and dynamic disks in just moments.

New! Span volume across multiple physical disks:
· Supports up to 32 disks.

New! Convert MBR disk to GPT and vice versa:
· Take advantage of GPT disks' ability to run partitions larger than 2TB with a quick conversion function.

New! GPT disks support:
· Frees you from the 2TB partition limit size imposed by MBR disk layouts.

Boot from CD/DVD, USB stick or USB drive:
· Use whatever medium
Requirements:

· Boot firmware: Bios-based
· Computer processor: modern processor, 800Mhz or faster
· System memory: 256MB
· Screen resolution: 800x600 pixels
· Installation disk
· Other: Mouse
· Computer processor: 1Ghz 32-bit (x86) or 64-bit (x64) processor
· System memory: 512MB or more
· Screen resolution: 1024x768 or higher
· CD / DVD recording drive, or a flash drive for bootable media creation
Limitations:

· All volume operations can be performed on volumes whose initial and resulting size is not larger than 100 MB. Operations on volumes whose size is larger than 100 MB cannot be committed.
· The following disk operations can be committed only if each volume on the disk is not larger than 100 MB:
· MBR to GPT and vice versa disk conversion;
· Basic to dynamic and vice versa disk conversion;
· Clone basic disk; you can proportionally increase the volumes on the target disk, but none of them will exceed 100 MB.

Download link Here

Saturday, 6 August 2011

Protect your computer from USB Drive

As more and more computer users carry USB sticks with them to store and transfer their data, it was only a matter of time before virus writers targeted these devices as a delivery mechanism. This is done through the use of an autorun.ini file. This type of file is basically just a text file with instructions to execute other files. The other files are the actual virus payload. They may have names like Ravmon.exe, New Folder.exe, svchost.exe, and possibly another files with a.dll extension.
Manual USB virus removal can be very tricky and it is suggested that you use a good antivirus/spyware removal tool to prevent and remove risks automatically. The first thing to do is make sure you have a good backup of your files on the USB stick. Offsite backups allow for greater peace-of-mind. Next, you'll want to make sure your computer is not set to automatically run CDs and removable devices. Microsoft has a one-click solution located in their knowledge base  to disable autorun.
It's best to attempt removal of infected files through the operating system's command prompt. Simply click Start, Run (or Search programs and files) and type cmd, Enter. Enter the drive letter your USB stick is using. If you need to check, go to My Computer (or Computer) and see what drive letter has been assigned to the USB device. Next, in the command prompt type that drive's letter, e.g., if it's E, type e: to switch to the E-drive).
Then, make sure all files, including hidden and system files, are showing. So, type attrib -rsh. This will ensure the files are not read-only and that system and hidden files are showing. Delete the autorun.ini file and any.exe and/or.dll files that look like they don't belong. The key thing is to make sure the autorun.ini file is gone. This will keep the virus from replicating again.
It's virtually impossible to keep your USB memory device free of viruses when it gets used in other computers; however, as long as you have autorun disabled on all of your computers and use up-to-date virus protection software, you will lessen the chances of becoming infected

Wednesday, 3 August 2011

Save Computer From Viruses

Nowadays Everyone is confused with the viruses at computer. And Everyone among us wants to save his computer from the virus attack.
Normally most of us not aware about where virus came from ? Really If we know the basic rules of this problem. There is no doubt that we can feel free to save us from computer viruses.
As Virus mostly can slow down your computer, hide your files , loss your data and many many more problems you can face with these viruses.

I am today posting some very easy tips if you follow that tips you will save your comuter about 80 to 90% from the virus attack.As the computer world is growing more severe virus are also coming in the market and these are danger for computers and are unable to clear quickly but not impossible.
Impossible is nothing in life you have to make some precautions for your computer to avoid these danger attack of viruses.


So here are some basic tips which will be very useful to you if you apply it everytime.
1. First make backup always of your personal data which you never want to loose in any case. Remember to make backup when you insert the file in your computer. Because backup will give you strong security and works for you like a stepnee of car lol.
2. U.S.B is main source nowadays used for injecting the virus in your computer. It is not intentionally done by any of your colleque but most of the time they are also not aware of the virus inside the Usb. Sometime your friends can do it intentionally if they have problem with you lol. So Always take care while inserting USb in your computer and scan it while copying the data.
Scan your USb with best anti virus you have in your computer.
3. Don’t download the files ending with .exe , .vbs , .scr , .pif , doc , .lnk , .com Mostly virus are spread with these extensions so always care about it and if you have to download this type of file.
4. Remember to download from verified sites which are trusted and are having high ranking.
5. Don’t open the Email and click on any link which you are not know any about. If you have not know any email so delete it instantly without opening it.
I hope these are small tips to save your computer from virus attack but it worth very much.

Thursday, 21 July 2011

USB Devices Responsible for 1 in 8 Malware Attacks


USB devices are handy, powerful and convenient. They're also a major headache for IT security administrators because they're almost impossible to police and they can spread malware like wildfire.
Security software developer AVAST Software did some monitoring and research and came to the conclusion that roughly one in eight of the 700,000-plus malware incidents it identified this year were the direct result of tainted USB devices.
Researchers said the prime vulnerability is found in the "AutoRun" feature in the Microsoft Windows operating system. AutoRun alerts computer users when a new device, such as a memory stick is connected and is designed to help them choose which application should run with the new files.
"AutoRun is a really useful tool, but it is also a way to spread more than two-thirds of current malware," Jan Sirmer, a security analyst at AVAST, said in the report. "The threat of USB-distributed malware is much more widespread than just the Stuxnet attacks on enterprise computers."
"Cybercriminals are taking advantage of people’s natural inclination to share with their friends and the growing memory capacity of USB devices," he added. " Put these two factors together and we have an interesting scenario."
To IT administrators, there's nothing interesting about a USB leak that exposes intellectual property or gives hackers an opening to spread malware throughout their corporate networks.
As more and more employees familiarize themselves with the legitimate benefits of USB sticks and other portable devices that they connect -- authorized or not -- to their company-issued PCs and mobile devices, the bigger the threat.
Leading security software vendors, including McAfee (NYSE: MFE) and Symantec (NASDAQ: SYMC), have issued numerous advisories warning companies and consumers of the inherent security risks of allowing workers to drag in all these portable storage and media-sharing devices to the office.
AVAST researchers said that USB storage devices infected by the INF:AutoRun-gen2 virus were wreaking havoc in the enterprise, infecting not only the device they connect to, but the entire network of PCs and mobile devices sharing the same local-area connections.
It's not just USB sticks that are gumming up the works. Smartphones, digital cameras and MP3 players are just as insecure and there's an alarming lack of supervision within most companies that's allowing these security threats to promulgate.
"In a work environment, staff will often bring in their own USB memory sticks to move files around,” Sirmer said. "This can bypass gateway malware scanners and leave the responsibility for stopping malware just on the local machines’ antivirus software."
Between 2000 and 2009, security researchers found that portable storage and media player devices were largely responsible for an exponential increase in new security signatures issued by leading security software vendors. Symantec alone said the number of new signatures --essentially the fixes for the malware leaks -- rose from 1,500 in 2000 to more than 2.5 million last year.
Security consulting and research firm the Ponemon Institute found that more than 800,000 data-sensitive devices, including USB drives, portable hard drives and laptops, were compromised last year.
AVAST researchers claim that more than 60 percent of all malware in circulation can be spread via USB drives and advises consumers and enterprises to make sure their AV applications are configured to immediately conduct auto-scans of any device connected to a PC or mobile device once their attached to the network.
 

Tips for preventing VIRUS, WORM and TROJAN HORSE infections


Methods that guarantee a computer or network is safe from computer viruses, worms and trojan horses simply do not exist. Users can take several precautions, however to protect their home and work computers from these malicious infections. The precautionary measures are:

1. Never start a computer with a floppy disk in drive A; unless it is an uninfected recovery disk.
2. Set the macro security in programs so you can enable and disable macros. Only enable macros if the document is from a trusted source and you are expecting it.
3. Install an antivirus program on all of your computers. Obtain updates to the antivirus signature files on a regular basis.
4. Check all downloaded programs for viruses, worms, or trojan horses. These malicious-logic programs often are placed in seemingly innocent programs, so they will affect a large number of users.
5. Never open an e-mail attachment unless you are expecting it and it is from a trusted source. Scan for viruses in all e-mail attachments you intend to open. Turn off message preview.
6.Write-protect your recovery disk by sliding the write-protect tab into the write-protect position.
7.If the antivirus program flags an e-mail attachment is infected, delete the attachment immediately.
8. Before using any floppy disk or zip disk, use the antivirus scan program to check the disk for infection. Incorporate this procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspecting users this way.
9. Back up your files regularly. Scan the backup program before backing up disks and files to ensure the backup program is virus free.By:Abdul Raziq

Wednesday, 13 July 2011

Top 10 Most Secure Operating Systems


Top 10 Most Secure Operating Systems


The security of a given anything, even operating systems (OS), tends to be a difficult or even controversial issue to examine. The only, truly secure operating systems are those that lack contact to the outside world (e.g., a DVD player's firmware). As for any other OS, they'll inevitably have some sort of vulnerability or weakness that can be exploited. In fact, any networked OS can be exposed by careful abuse of its configuration—no exceptions. All the same, here are the top ten most secure operating systems on the planet today.


1.           OpenBSD: By default, this is the most secure general purpose operating system out there. The proof in the pudding? The fact that it suffered only two remote attack vulnerabilities in the last decade serves as solid evidence of its stringent security and strict auditing policy. Moreover, OpenBSD lacks a large enough attack surface (care of running numerous web applications) for hackers to exploit.

2.           Linux: Linux is a superior operating system. When customized it can be set up to extremely secure. Linux has an impressive vulnerability patching policy. 

3.           Windows Server 2008: Say what you will about a Microsoft operating system's security; at the very least, they know how to improve and they've gone through the very worst security threats that the Internet can dish out. This iteration of Windows Server has improved backup and recovery, user account control, web server (IIS) role, and server role security configuration.

4.           Windows Server 2000: This operating system is so secure that it took nearly a decade before Microsoft can come up with a better one. This OS for network servers, notebook computers, and corporate workstations continues to get monthly security patches even after nine years since its release.

5.           Windows Vista: Microsoft attempted to fix the security issues that has plagued Windows 95, 98, ME, and XP, but they ended up alienating consumers instead. The main complaints that people aimed against the polarizing OS—confusing security policies and the lack of backward compatibility with older applications—were actually security measures that were supposed to make Vista a lot more protected from breaches and hacker penetrations.

6.           Windows Server 2003: The good news is that Windows Server 2003 is still a more secure OS than Windows XP. The bad news is that, security-wise, it's even worse than its earlier prototype, Windows Server 2000. Nevertheless, it features competent security improvements like default disabling of vulnerable services and a built-in firewall.

7.           Windows XP: It became one of Microsoft's greatest and most long-running releases (mostly because of Vista's failure to connect to the general Windows-using consumer base). Tragically, it's also one of the most non-secure operating systems of all time as well.Because this OS runs a lot of network services by default and allows users to access full privileges by default, it also gets hacked and breached on a nigh-daily basis by default as well.

8.           HP-UX 11i: Even though it's not one of the most commercially successful operating systems in the market today, this Unix-based Hewlett-Packard OS has been included in this list because of its superior security policies to several more popular operating systems (namely, Mac OS X, Solaris, and Linux).

9.           Solaris: This Sun Microsystems Unix-OS variant is on the lower notches of this article's security hierarchy because it's not inherently security-focused. Because of certain business-related circumstances as well, most of the Solaris source code has already been published via the OpenSolaris project.
  
10.      Mac OS X: This Apple-made OS handles user permissions better than, say Windows XP, but it still contains an indecent number of vulnerabilities and remote exploits in its systems. That, coupled with Apple's slow response to many of its security issues, has landed this operating system at the bottom of this list.

Sunday, 10 July 2011

Training for CISSP Video Practice


 


 














Tutorials-Training for CISSP Video Practice | 1.53 GB 

Training for CISSP Video Practice
Module 00 : Course Introduction and Overview.
Module 01 : Access Control Systems and Methodology.
Module 02 : Telecommunications and Network Security.
Module 03 : Security Management Practices.
Module 04 : Applications and Systems Development.
Module 05 : Cryptography.
Module 06 : Security Architecture and Models.
Module 07 : OPerations Security.
Module 08 : Business Continuity and Disaster Recovery Planning.
Module 09 : Laws Investigations and Ethics.
Module 10 : Physical Security.
Module 11 : Methods of Attack.
Install CISSP Practice Test Demo.

Wednesday, 6 July 2011

We Know Why You Haven’t Decided Yet To Purchase A Security Product!



There are many people, who heared about the security tools, available for data protection. But it is not an easy issue to understand to those who are not software literate. In this article we will look at this issue in order to understand that.
With the growth of information technologies, people own a lot of professional or personal information, which has both a financial and emotional value. As people get vulnerable to numerous security threats, they become more and more aware of the ways they could overcome their vulnerability. And this security concern is common to all people, especially when it comes to lose something they possess. This is why the security products, available on the IT security market, are more and more commonly expanded in Europe and USA.
Among many people who rely on different kinds of digital assets in their businesses and private life, there are some whose main concern is how to protect them. There are also people who think that it is too far for them to make a decision on purchasing existing security products, because they do not have any special knowledge in security. Here we would like to come up with the data, which would help you to get a start in considering the ways you could protect your information.
At first look, it seems that the security products market is so sophisticated, that without any professional knowledge it is not possible to understand what kind of products you need. You may think that it is so much complicated to be able to analyze what solutions exist, what for they may be used and which one is right for you to purchase.
These questions and the solutions to them may seem vague to people with excellence in other areas, but with no knowledge in the IT security. By giving the answers to these and other related questions, we will help you define your needs and decide which data protection and access control solutions will best suit your needs.
1. What is the security software for and how can it help people?
While the security products industry is largely expanding in the world, there are more and more areas where it can be used. The Dekart Company has committed itself to developing solutions that can be easily deployed and used by people.
Most of the digital assets, available on the market, are designed with the option for the security hardware installation. The PCs and many mobile devices that can be connected to PCs (like mobile phones) and that may have an increased need for security, are technically available now to be protected.
From another point of view, there are products, which can be of real help in protecting important data (like hard disk encryption and file encryption software, brought to you by Dekart). These products can protect any type of data for any kind of people, who are interested in protection of their business information, scientific researches, as well as personal information. This type of protection ensures that no data will be accessed and viewed by unauthorized malicious users, even if your computer is lost or stolen or if there are many people who can access it.
The security products have another large area of usage. When there is the need to control access to the office computers, Dekart offers its smart card and biometric authentication solutions. The state-of-the-art biometric identification improves the security of login procedures, thus ensuring that no third party will access critically important information.
Users now can also protect and encrypt their email correspondence using Dekart digital certification service in combination with the smart card and biometric authentication.
There are different hardware devices used to provide two- and three-factor authentication to secure access to the information. Dekart offers the flexibility to choose between different vendors’ smart cards, tokens, biometric devices and even USB flash drives to satisfy users’ security needs.
The types of the Hardware Keys (USB tokens and Smart cards)
Dekart Software uses the following types of Hardware Keys to generate secret cryptographic keys and store users’ private data:
1. USB (universal serial bus) tokens are smaller token-style cards that plug directly into the USB port of a computer. The USB-compatible ports are being built into many PCs (i.e., desktops and laptops) and many mobile devices that connect with PCs (i.e., PDAs and mobile phones), as this is the simplest type of reader to connect
2. Smart cards are conventional credit card–shaped contact cards
The Smart Card device contains the cryptographic chip. The use of credit-card size Smart Cards has successfully been adopted by a number of European companies, with a particularly high level of acceptance in Germany and France. However, high hardware deployment costs and the lack of application standards associated with Smart Cards have proved to be significant barriers to their widespread use, especially in the US.
USB Token solution is different from traditional smart card solutions in that it does not require a reader infrastructure, helping to make it less expensive for organizations to deploy and easier for users to adopt.
Dekart has developed the following utilities for managing and deploying the smart cards or tokens used with Dekart applications:
1. Dekart Key Manager Utility can help determining the memory usage of the card, performing backups and duplicating the data stored on the hardware keys.
2. Key Formatting utility or Corporate Key formatting utility allows formatting the smart cards or tokens to be used with Dekart software.
What to consider before purchasing a smart card or USB token?
1. Define all of your anticipated present and future card usage requirements
2. Define the memory requirements for each certificate or application. Here is a sample of Smart Card memory usage:
· Free space – 5K
· Your custom application -1,5 K
· Smart Card logon certificate -2,5 K
· Smart card vendor applications – 8K
· Windows for Smart Cards Operating system -15K
3. Making a decision on which present and future applications are required. It is important to preview the future applications needed, as it is important to leave an extra storage space on the chip.
4. Test smart cards and smart card readers to verify compatibility before deploying them in your production environment.
In conclusion, there are few things important to understand:
1. It is important to remember that there are different types of hardware and software available for them.
2. It is suggested to understand specific needs of the buyer and the variety of existing products in order to make the best purchasing decision.
***You are welcome to drop me a line on abrazaq@gmail.com***