Except for fans, the typical hard drive is just about the only piece of a modern computer that still has moving parts. While solid state drives are becoming more popular every day, most of us still use at least one regular hard drive, spinning platters and all. Because those platters are spinning around at 5400 or 7200 PRM (and sometimes even faster) for countless hours, you would do well to check on their health every now and then.
In the world of electronic documents and paperless offices, the PDF (Portable Document Format) has become an essential document format. A PDF file is readable on multiple operating systems, in a wide variety of programs and is able to retain document formatting regardless of the device, operating system or program it is viewed on. Users can also easily organise PDFs, bookmark pages for reading later or even convert PDF to eBook format. But it’s not just these great features which make it such a popular format of the business world: There’s also the topic of PDF security.
1. PDF Documents Can Be Secured Using Public Keys Or Passwords
2. Some Documents May Be Printed Even When Password-Protected
3. PDF Security Can Be Used To Prevent Copying
4. Some Encryption and PDF Protections Can Be Broken Or Avoided
Lavasoft just released version 10 of Ad-Aware. As always, Ad-Aware promised to give users peace of mind by keeping them safe while they work and play with their computers. Ad-Aware protects computers from viruses, spyware and adware. Of course, there is a free version as well as two premium versions. The free version offers enough protection for most users. If you are interested in getting the free version, or downloading a trial of one of the premium versions, download it here.
As you may know, I am a huge proponent of jailbreaking. I have jailbroken every iOS device I have ever owned and I can guarantee you that will never change. The freedom of being able to tweak your device to make it your own is so awesome. Of course, if you are using your jailbreak to do illegal things, that is a problem, but as long as you are using it ethically, than there is nothing wrong with having a little fun with your device.
Music Controls Pro (Free 5 day trial, $6.00 after trail)
BiteSMS (Free with ads, $10 premium license)
Maybe it has already noticed one or the other: you can receive on an account of various Google accounts emails but also send emails. So I can, for example, my work account to link to Gmail and use Gmail from anywhere to write under a completely different e-mail address. Anyone interested in this subject who can read my information and instructions: Gmail - Tips & Tricks . Building on this subject, it is interesting to know that now can also set the mobile Gmail app the sender.
This was not possible before, and seems to have been implemented clandestinely. By clicking on the sender field can switchen it between the sender accounts. By the way,the mobile Gmail app for IOS, which was initially so terrible , is now my default iOS - even if she gets even more unfortunately for the Android counterpart. If not for you, the sender must be changed, so you will log off and back on again. ( via )
Malicious Android application stealing banking credentials
A new form of smart Android malware can not only steal your online banking information, but update itself in the future and secretly send contact information stored on your device off to the Bad Guys. Security researchers at McAfee have discovered a malicious Android application capable of grabbing banking passwords from a mobile device without infecting the user’s computer.
From a McAfee blog post on the subject, penned by Malware Researcher Carlos Castillo: "To get the fake token, the user must enter the first factor of authentication (used to obtain initial access to the banking account). If this action is not performed, the application shows an error. When the user clicks “Generar” (Generate), the malware shows the fake token (which is in fact a random number) and sends the password to a specific cell phone number along with the device identifiers (IMEI and IMSI). The same information is also sent to one of the control servers along with further data such as the phone number of the device."
The app also includes a number of nasty lines of code that could be used to obtain users' contact lists and then send them off to a control server. "From man-in-the-middle attacks we now see more sophisticated, remote-controlled banking Trojans that can get more than one factor of authentication and update itself to, for example, modify a phishing attack to get other required credentials–such as the name or the ID number of the user–to perform electronic fraud," writes Castillo. "Due to the increasing popularity of Android and mobile-banking applications, we expect that more threats like this will appear."
If Mobile banking does take off, beware, since the Android security architecture won't be able to stop those types of attacks, given the ease with which users can be tricked, via social engineering attacks, into installing third-party applications.
Google Apps and Hangout? Yes, I know - has been around longer. Google Docs and YouTube were so long with the video chat in Google veknüpft +. Now Google has the API Hangout released into the wild is supposed to mean: the beta-phase is completed. From now on, developers can use this API to develop applications for themselves Hangout.
This includes not only the already known applications such as slideshare now the well-known service, a poker game, a quiz and also an application where the Hangout participants can paint together.
In the video chat window, you can these apps in a new tab, or you choose to display the last used applications. I must admit that I'm still not used often to video chat, but with the release of the API or the anticipated apps I could probably be persuaded to beat often times to keep my scruffy face in the webcam.
What do you think? Exciting feature redundant or? And how do you video chat use at all? Via Google + - or are you rather go on Facebook or Skype?
The hacktivist organization known as Anonymous has announced its plans to disable the internet this Saturday, March 31st. The group has been known to bring down websites, large ones at that, but has never attempted something as large as the entire internet before.
This announcement, other than its enormous scope, should come as a surprise to nobody. Indeed, they threatened retaliation for the arrests of 25 of their members last month. But their plan for Saturday isn’t about vengeance. Instead, it is about combating the still live threat by Congress on the autonomy of the internet through revised versions of the Stop Internet Piracy Act (SOPA) and Protect IP Act (PIPA). These pieces of legislation, which saw the largest online protest in history, along with ACTA, do indeed represent a serious threat to the internet as we know it.
Their mode of attack is par for the course for Anonymous. By using a method known as distributed denial of service attack the plan is to attack what Anonymous calls the internet’s thirteen root servers. If the servers are overloaded with request from IP address, it will stop redirecting others. In essence, anyone else trying to access the internet will get the web equivalent of a busy signal. A momentarily lapsed internet will not affect other communications which rely on separate internet frameworks and devices. But the enormity and daring of this undertaking is something to consider. In a world utterly reliant on the internet, whirling around at lightning speeds, the lack of access to the internet, albeit even if for only a day, will certainly have its repercussions, whether cultural or technological or both.
But is it even possible?
According to the security firm Errata Security’s Robert Graham, not so much. In a statement on the issue, Graham went on to say that while such an attack was possible it is unlikely to succeed on Saturday. He holds that even if Anonymous is able to cause problems on the local level, the attack will never go global. But he warns that “just because I say Anonymous can’t do it doesn’t it mean it can’t be done.”
But even with the advanced warning, Alan Woodward, a professor in the department of computing at the University of Surrey, thinks that Anonymous could do some real damage. In an opinion piece for the BBC news, Woodward cited Brian Honan, an information security expert for BH Consulting, as saying “unfortunately, despite [DNS] vulnerability being widely known for many years, a large proportion of DNS servers are still not configured correctly to prevent this type of attack.”
Even the VP of Radware Security, Carl Herberger stated that he is surprised that many of his colleagues are not taking the threat seriously. He credits his concern to several DNS vulnerabilities, some of them due to design flaws and social engineering vulnerabilities, but also from insiders interested in “ideological payback.”
While I do not know what will happen on Saturday, part of me does wish for them to succeed. The sheer boldness of it makes me root for the underdog in the fight. But that being said I feel that even if they should fail in Operation Blackout, they will still have succeeded in pressing the issue of internet censorship. My hope, whatever transpires on Saturday, is that the online community stay ever vigilant in opposing any legislation which would damage and censor the greatest tool for the sharing of ideas and promotion of freedom the world has ever known. And that, for me, is a big enough win.via[pnosker]
Ok, there probably will be subject of interest to only a few, since it is the server version of is. Version 8 of the Windows Server ships with a cloud backup.The ugly word cloud, which simply means: we can use Windows 8 server operators to secure our data outside of their own infrastructure - the Internet. Is then called Microsoft online backup.
Currently, users can test the U.S. for fun and get 10 GB of memory. According to Microsoft, is to configure the online backup can be managed more easily. Inkremetelle backup and encryption? Of course. Passive monitoring administrators who are interested in the topic, for further information gladly look over here .via[caschy]
Techies of the world actually wait every hour that someone from Google on the stage, a cylinder of the present then a is taken. * drum roll * € 199 . So it is already rumored and believed - and ASUS or Samsung, it should be - maybe even later on his own home, with Motorola Mobility. While it was sold as the Galaxy Nexus of God and the world, Google's tablet is perhaps in its own online store selling additionally.
Seems the Kindle and the Wall Street Journal , these "powered by Google" Tablets are perhaps even subsidized, so they really get going places on the market. Apple also had success with - only who were smart, who can be costly for mobile operators subsidize their iPhones via[Caschy] to be working - at least those are the only tablets, which you can assign to a certain extent, but other devices are unfortunately only "ran a distant second" to find individual stories or less. According to reports the