Friday, December 30, 2011
Free and open-source software
Free and open-source software (F/OSS, FOSS) or free/libre/open-source software (FLOSS) is software that is liberally licensed to grant users the right to use, study, change, and improve its design through the availability of its source code. This approach has gained both momentum and acceptance as the potential benefits have been increasingly recognized by both individuals and corporations-wIKIPEDIA
ONE OF OPEN SOURCE SOFTWARE :
http://sourceforge.net/
Thanks to people who hard work to created open source software!
Instant Lock -DAMN SOFTWARE!
READ COMMENTS ABOUT THIS DAMN SOFTWARE :
"The trial ran out without ANY sort of warning, and I have lost all my files. How do I find them again? I am NOT going to renew my license unless I find these files now. I will not be tricked into purchasing something that says "FREE DOWNLOAD" and "FREEWARE".
Not very good business. Crooks in fact. Too bad"
"Its a bad software.. if u will use try version and it wil expire then it will lock ur file for forever.... u cant unlock ur file untill u will not buy this software.."
"This software is impossible to remove from your machine without a password. In my case i tried it for awhile, decided i didn't like it, and didn't use it for a good 3 months. I then tried to uninstall it and because i cant remember the password from 3 months ago, it will not let me uninstall it.
This is hijack-ware by any other name. it insists I purchase the software in order to uninstall it!"
"guys, even i have the same problem, my personal pictures are been locked.. can't recover.. they are asking me to buy the full version.. to my worst part i forgot the password too.."
"This Software have no Uninstallation Option, so do not Install it, Totally false and Cheap marketing to buy this software because you have not any option for Uninstallation.
This software is a scam and Maleware.
This Software will be baned from this web site as wall as C Net .com immeditally.
Legal action may be granted for somebody from any person or by Government bodies."
"BEWARE ! This "freeware" will lock you out of any files you try it with PERMANENTLY - until you pay for the full version. The company does not respond to emails, and your files will not become available if you uninstall, either. DO NOT FALL FOR THIS MARKETING PLOY"
"Instant lock is bullshit ! they will lock all your imp files and demand for buying once the period is over. DO NOT USE IT ANY WAY!"
"Never use it. This is a bad bad trap. I am in it."
BEWARE , MALWARE , DONT download, don't waste time, this software is a Virus that you will not be able to uninstall from your system.
"I installed the Trial version and once it expired it does not offer any mean for you to recover your hijacked files, the only way is for you to pay for the license no matter if you liked it or not.more then that, it does not offer any real security, it is just copying your files in the a garbled hidden directory that any entry level user can find when you try to unload the software it will not let you unload as it is tied to a process that will not let you delete it, althoug I have deleted it manually ( in 5 minutes) this tactic to achieve sales is more of a trap and not a decent practice for selling software
Do not Buy and do not install the trial version unless you are a pro who knows how to delete this garbage of your system"
"DONT BUY.
I installed the trial version and locked about 50 gigs of videos inside of it. After the 30 days, couldnt unlock it.
Paid to get full version to unlock my stuff.
STILL COULDNT
Sent an email to get help.
Its been over a month. NO REPLY
now 50 gigs of my harddrive are wasted
Thank you so much Instant Lock!!!!!!! BAD PROGRAM HORRIBLE CUSTOMER SUPPORT"
"This software is a scam. I installed the trial version only to have the trial expire and the program lock my folders. I can't even uninstall it. The programs website says they will only respond to queries from registered users, so the only way to unlock is to pay. SCAM."
DONT DOWNLOAD AND INSTALL!!!!!!!!!!!!!!!!BEWARE!!!!
Thursday, December 29, 2011
Internet Download Manager
Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.
Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
Version 6.07 adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Videos. It also features complete Windows 7 and Vista support, YouTube grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.
price $29.95.
Source : http://www.internetdownloadmanager.com/
Internet lubuk kaut keuntungan
Internet lubuk kaut keuntungan
BERBILION sudah berjaya dibolot penjenayah siber hanya dengan penipuan melalui alam siber.
DUNIA tanpa sempadan. Ia cukup sinonim dengan perkembangan teknologi alam siber yang semakin serba canggih hari ini.
Dengan hanya satu klik sahaja, pelbagai maklumat, kemudahan, perkhidmatan dan banyak lagi dapat diakses di mana-mana sahaja tanpa perlu mengerah keringat sehingga titisan peluh jatuh ke bumi.
Bagaimanapun, kecanggihan teknologi ini disalah guna sesetengah pihak untuk mengaut keuntungan melalui alam siber sehingga menyebabkan kerugian mencecah berbilion ringgit.
Bahkan, penjenayah siber ini akan mencari pelbagai taktik dalam mencari kemewahan melalui jalan pintas.
Modus Operandi
Menurut Penolong Pengarah Jenayah Siber dan Multimedia, Jabatan Siasatan Jenayah Komersial Bukit Aman, Asisten Komisioner Kamarudin Md. Din, terdapat pelbagai taktik yang diguna pakai penjenayah siber dalam memerangkap mangsa untuk kepentingan mereka.
Bagaimanapun, beliau memberitahu, antara modus operandi tertinggi dicatatkan dalam kes-kes jenayah siber adalah belian barangan, penyamaran sebagai pegawai bank atau polis, mesin pengeluaran wang automatik (ATM), bungkusan dan phishing.
“Belian barangan mencatatkan kes tertinggi apabila suspek akan mengiklankan penjualan barangan di internet dan meminta mangsa membuat bayaran membeli barangan tersebut.
“Mangsa hanya akan menyedari ditipu setelah membuat pembayaran dan tidak menerima barangan dijanjikan seperti di dalam laman berkenaan,” katanya.
Kamarudin menambah, penyamaran sebagai pegawai bank atau polis menyaksikan sindiket membuat panggilan atau menghantar khidmat pesanan ringkas (SMS) secara rambang kepada mangsa.
“Selepas itu, ahli sindiket akan menyamar sebagai pegawai bank atau polis dengan menjawab panggilan mangsa lalu meminta mendedahkan butiran akaun.
“Mangsa akan diarahkan mengunjungi mesin ATM dan melaksanakan arahan diberikan melalui perbualan telefon sehingga wang mangsa dipindahkan ke akaun lain,” katanya.
Suspek turut akan menggunakan maklumat perbankan pemegang akaun untuk pengeluaran wang melalui mesin ATM
Satu lagi taktik yang biasa digunakan adalah mangsa akan berkenalan dengan suspek melalui laman sosial dan diyakinkan suspek ikhlas untuk bersahabat.
PENGGUNAAN telefon pintar mendedahkan lagi pengguna dengan penjenayah siber.
“Mangsa kemudian akan dijanjikan menerima satu bungkusan dikirim dari luar negara. Kebiasaannya bungkusan tersebut mengandungi barangan berharga seperti wang atau barangan kemas.
“Mereka akan dimaklumkan bahawa barangan tersebut telah ditahan kastam dan perlu membuat bayaran untuk pelepasan barangan tersebut,” ujarnya lagi.
Beliau menambah, kaedah phishing pula digunakan untuk mencuri maklumat secara dalam talian.
Katanya, suspek akan mewujudkan laman web palsu bagi mendapatkan maklumat peribadi atau pun perbankan mangsa.
Pilih Alam Siber
Pensyarah Kriminologi Universiti Sains Malaysia (USM), Prof. Madya Dr. P. Sundramoorthy pula berkata, terdapat beberapa faktor yang mendorong penjenayah siber memilih alam maya dalam melakukan jenayah.
“Di alam siber penjenayah biasanya lebih bersikap meyakinkan kerana mereka tidak perlu berkonfrantasi dengan mangsa malah, boleh dilakukan di mana-mana sahaja.
“Selain daripada itu, mereka juga mempunyai persepsi bahawa alam siber selamat daripada dikesan pihak berkuasa,” ujarnya.
Sundramoorthy berkata, ia disebabkan identiti mereka tidak boleh dicam dan atau boleh dipalsukan.
Menyentuh mengenai mengapa mangsa mudah diperdaya penjenayah siber, beliau menjelaskan, antara penyebab ia berlaku adalah cinta itu buta.
“Akibat penangan cinta dan beranggapan telah menemui teman hidup, mereka mudah percaya kepada orang tidak dikenali.
“Kebiasaannya, kes-kes sebegini disebabkan mangsa jatuh cinta dan mempercayai suspek sehingga ditipu. Ada juga di antara mereka tidak pernah menemui suspek,” katanya.
Ujarnya lagi, sikap tamak turut memainkan peranan apabila mangsa ingin menjadi kaya dengan jalan pintas.
Menyedari pelbagai amaran dan pendedahan telah dilakukan pihak berkuasa serta media, mereka masih yakin dengan iklan atau pun skim cepat kaya ini.
“Bagaimanapun, majoriti mangsa-mangsa jenayah siber tidak mengetahui mereka adalah mangsa.
“Ia boleh dikatakan kecuaian apabila memberi atau pun mendedahkan maklumat kritikal kepada penjenayah siber,” katanya.
Pencegahan
Sementara itu Ketua Pegawai Eksekutif CyberSecurity Malaysia, Lt. Kol. (Bersara) Prof. Datuk Husin Jazri berkata, orang ramai perlu sentiasa mempunyai sikap berwaspada dan berhati-hati apabila berada di alam siber.
CYBERSECURITY antara badan yang menyediaka pelbagai info dam tip mengenai jenayah siber.
“Jangan mudah percaya dengan orang yang baru dikenali terutama melalui laman web sosial kerana kita tidak mengetahui identiti sebenar mereka serta tujuan mereka menjalinkan persahabatan dengan kita.
“Dalam pada itu, mereka juga dinasihatkan agar tidak mendedahkan maklumat diri serta keluarga kepada orang yang baru dikenali kerana mereka mungkin mempunyai niat tidak baik. Bahkan, akhirnya anda akan terdedah kepada anasir-anasir negatif serta berniat jahat,”katanya.
Husin menegaskan, pengguna alam siber tidak perlu memuatnaik (upload) atau berkongsi gambar-gambar serta video yang berbentuk peribadi.
Katanya, mereka perlu memastikan mewujudkan tetapan privasi untuk melindungi maklumat peribadi daripada mereka yang bukan berada di kelompok rakan-rakan.
“Orang ramai boleh mengunjungi laman web kami iaitu www.cybersecurity.my kerana daripada laman web ini, mereka boleh masuk ke laman CyberSAFE (www.cybersafe.my) yang terdapat pelbagai tip serta nasihat berhubung keselamatan siber di situ,” katanya lagi.
Sekiranya jenayah siber tidak diambil perhatian dengan serius, potensi kerugian dalam beberapa sektor ekonomi di Malaysia dalam jangka masa lima tahun dianggarkan boleh mencecah sehingga RM2.73 bilion.
Jenayah siber boleh memberi kesan negatif kepada imej negara dan menjejaskan peluang pelaburan dari luar negara kerana kurangnya keyakinan serta kepercayaan terhadap tahap keselamatan siber negara.
sumber :KOSMO
BERBILION sudah berjaya dibolot penjenayah siber hanya dengan penipuan melalui alam siber.
DUNIA tanpa sempadan. Ia cukup sinonim dengan perkembangan teknologi alam siber yang semakin serba canggih hari ini.
Dengan hanya satu klik sahaja, pelbagai maklumat, kemudahan, perkhidmatan dan banyak lagi dapat diakses di mana-mana sahaja tanpa perlu mengerah keringat sehingga titisan peluh jatuh ke bumi.
Bagaimanapun, kecanggihan teknologi ini disalah guna sesetengah pihak untuk mengaut keuntungan melalui alam siber sehingga menyebabkan kerugian mencecah berbilion ringgit.
Bahkan, penjenayah siber ini akan mencari pelbagai taktik dalam mencari kemewahan melalui jalan pintas.
Modus Operandi
Menurut Penolong Pengarah Jenayah Siber dan Multimedia, Jabatan Siasatan Jenayah Komersial Bukit Aman, Asisten Komisioner Kamarudin Md. Din, terdapat pelbagai taktik yang diguna pakai penjenayah siber dalam memerangkap mangsa untuk kepentingan mereka.
Bagaimanapun, beliau memberitahu, antara modus operandi tertinggi dicatatkan dalam kes-kes jenayah siber adalah belian barangan, penyamaran sebagai pegawai bank atau polis, mesin pengeluaran wang automatik (ATM), bungkusan dan phishing.
“Belian barangan mencatatkan kes tertinggi apabila suspek akan mengiklankan penjualan barangan di internet dan meminta mangsa membuat bayaran membeli barangan tersebut.
“Mangsa hanya akan menyedari ditipu setelah membuat pembayaran dan tidak menerima barangan dijanjikan seperti di dalam laman berkenaan,” katanya.
Kamarudin menambah, penyamaran sebagai pegawai bank atau polis menyaksikan sindiket membuat panggilan atau menghantar khidmat pesanan ringkas (SMS) secara rambang kepada mangsa.
“Selepas itu, ahli sindiket akan menyamar sebagai pegawai bank atau polis dengan menjawab panggilan mangsa lalu meminta mendedahkan butiran akaun.
“Mangsa akan diarahkan mengunjungi mesin ATM dan melaksanakan arahan diberikan melalui perbualan telefon sehingga wang mangsa dipindahkan ke akaun lain,” katanya.
Suspek turut akan menggunakan maklumat perbankan pemegang akaun untuk pengeluaran wang melalui mesin ATM
Satu lagi taktik yang biasa digunakan adalah mangsa akan berkenalan dengan suspek melalui laman sosial dan diyakinkan suspek ikhlas untuk bersahabat.
PENGGUNAAN telefon pintar mendedahkan lagi pengguna dengan penjenayah siber.
“Mangsa kemudian akan dijanjikan menerima satu bungkusan dikirim dari luar negara. Kebiasaannya bungkusan tersebut mengandungi barangan berharga seperti wang atau barangan kemas.
“Mereka akan dimaklumkan bahawa barangan tersebut telah ditahan kastam dan perlu membuat bayaran untuk pelepasan barangan tersebut,” ujarnya lagi.
Beliau menambah, kaedah phishing pula digunakan untuk mencuri maklumat secara dalam talian.
Katanya, suspek akan mewujudkan laman web palsu bagi mendapatkan maklumat peribadi atau pun perbankan mangsa.
Pilih Alam Siber
Pensyarah Kriminologi Universiti Sains Malaysia (USM), Prof. Madya Dr. P. Sundramoorthy pula berkata, terdapat beberapa faktor yang mendorong penjenayah siber memilih alam maya dalam melakukan jenayah.
“Di alam siber penjenayah biasanya lebih bersikap meyakinkan kerana mereka tidak perlu berkonfrantasi dengan mangsa malah, boleh dilakukan di mana-mana sahaja.
“Selain daripada itu, mereka juga mempunyai persepsi bahawa alam siber selamat daripada dikesan pihak berkuasa,” ujarnya.
Sundramoorthy berkata, ia disebabkan identiti mereka tidak boleh dicam dan atau boleh dipalsukan.
Menyentuh mengenai mengapa mangsa mudah diperdaya penjenayah siber, beliau menjelaskan, antara penyebab ia berlaku adalah cinta itu buta.
“Akibat penangan cinta dan beranggapan telah menemui teman hidup, mereka mudah percaya kepada orang tidak dikenali.
“Kebiasaannya, kes-kes sebegini disebabkan mangsa jatuh cinta dan mempercayai suspek sehingga ditipu. Ada juga di antara mereka tidak pernah menemui suspek,” katanya.
Ujarnya lagi, sikap tamak turut memainkan peranan apabila mangsa ingin menjadi kaya dengan jalan pintas.
Menyedari pelbagai amaran dan pendedahan telah dilakukan pihak berkuasa serta media, mereka masih yakin dengan iklan atau pun skim cepat kaya ini.
“Bagaimanapun, majoriti mangsa-mangsa jenayah siber tidak mengetahui mereka adalah mangsa.
“Ia boleh dikatakan kecuaian apabila memberi atau pun mendedahkan maklumat kritikal kepada penjenayah siber,” katanya.
Pencegahan
Sementara itu Ketua Pegawai Eksekutif CyberSecurity Malaysia, Lt. Kol. (Bersara) Prof. Datuk Husin Jazri berkata, orang ramai perlu sentiasa mempunyai sikap berwaspada dan berhati-hati apabila berada di alam siber.
CYBERSECURITY antara badan yang menyediaka pelbagai info dam tip mengenai jenayah siber.
“Jangan mudah percaya dengan orang yang baru dikenali terutama melalui laman web sosial kerana kita tidak mengetahui identiti sebenar mereka serta tujuan mereka menjalinkan persahabatan dengan kita.
“Dalam pada itu, mereka juga dinasihatkan agar tidak mendedahkan maklumat diri serta keluarga kepada orang yang baru dikenali kerana mereka mungkin mempunyai niat tidak baik. Bahkan, akhirnya anda akan terdedah kepada anasir-anasir negatif serta berniat jahat,”katanya.
Husin menegaskan, pengguna alam siber tidak perlu memuatnaik (upload) atau berkongsi gambar-gambar serta video yang berbentuk peribadi.
Katanya, mereka perlu memastikan mewujudkan tetapan privasi untuk melindungi maklumat peribadi daripada mereka yang bukan berada di kelompok rakan-rakan.
“Orang ramai boleh mengunjungi laman web kami iaitu www.cybersecurity.my kerana daripada laman web ini, mereka boleh masuk ke laman CyberSAFE (www.cybersafe.my) yang terdapat pelbagai tip serta nasihat berhubung keselamatan siber di situ,” katanya lagi.
Sekiranya jenayah siber tidak diambil perhatian dengan serius, potensi kerugian dalam beberapa sektor ekonomi di Malaysia dalam jangka masa lima tahun dianggarkan boleh mencecah sehingga RM2.73 bilion.
Jenayah siber boleh memberi kesan negatif kepada imej negara dan menjejaskan peluang pelaburan dari luar negara kerana kurangnya keyakinan serta kepercayaan terhadap tahap keselamatan siber negara.
sumber :KOSMO
ASIAN BROADCASTING NETWORK (ABN)
Satu perkhidmatan TV berbayar akan memasuki pasaran yang kini di’monopoli oleh Astro ini seawal enam bulan pertama tahun 2012.
Perkhidmataan baru ini akan di’kenali sebagai Asian Broadcasting Network (ABN) yang telah mensasarkan 3 juta pelanggan dalam masa lima tahun operasi berjalan.
ABN adalah merupakan idea & projek utama Nilamas Corporation yang di’pengerusikan oleh Sreedhar Subramaniam — berkata kepada media yang ABN tidak berniat untuk mencabar penyedia servis sama yang sedia ada.
Malah matlamat utama ABN adalah untuk menyediakan perkhidmatan baru & alternatif kepada lebih 4 juta rakyat Malaysia yang tidak memiliki sebarang perkhidmatan TV berbayar hari ini.
Teknologi yang di’miliki ABN juga di’katakan mampu menyediakan hampir 1,000 saluran buat pelanggan mereka nanti & turut menjanjikan kualiti penerimaan yang jauh lebih baik.
Yang lebih penting, ABN di’khabarkan akan menawarkan kadar yuran langganan yang lebih murah dari penyedia kini dan mensasarkan 500,000 pengguna awal selepas setahun beroperasi.
SUMBER : http://www.perekacerita.com
Tuesday, December 27, 2011
Disabling automatic sign-in
For safety
Disabling automatic sign-in
If you're being automatically signed in to your Google Account, you may have enabled either a password-storing feature in your browser, or the Google Accounts option to "Stay signed in."
Google Accounts
First check if the Google Accounts "Stay signed in" option is actually enabled. Visit the Google Accounts homepage and verify if the checkbox above the Sign In button is selected. If it's selected, delete your browser's cookies. If you're using Mozilla Firefox version 1.5 or later:
Go to the Tools menu.
Select Options.
Select the Privacy icon.
Click the Cookies tab and the Clear Cookies Now button.
Click OK to exit.
Each time you sign in to your Google Account, make sure the "Stay signed in" option isn't selected.
If the problem persists, you may want to clear your browser's cache and cookies. Please note that while deleting your cookies may resolve the problem, it will also remove your saved settings for sites you've previously visited.
source : http://support.google.com/
Disabling automatic sign-in
If you're being automatically signed in to your Google Account, you may have enabled either a password-storing feature in your browser, or the Google Accounts option to "Stay signed in."
Google Accounts
First check if the Google Accounts "Stay signed in" option is actually enabled. Visit the Google Accounts homepage and verify if the checkbox above the Sign In button is selected. If it's selected, delete your browser's cookies. If you're using Mozilla Firefox version 1.5 or later:
Go to the Tools menu.
Select Options.
Select the Privacy icon.
Click the Cookies tab and the Clear Cookies Now button.
Click OK to exit.
Each time you sign in to your Google Account, make sure the "Stay signed in" option isn't selected.
If the problem persists, you may want to clear your browser's cache and cookies. Please note that while deleting your cookies may resolve the problem, it will also remove your saved settings for sites you've previously visited.
source : http://support.google.com/
Freeware : AVAST HOME
Avast! Free Antivirus is for the best free antivirus software in light of recent developments. Avast has steadily been improving its detection rates over the past few years and now ranks with the some of the best. Avast has the most features of all the free antivirus with full real-time capabilities including web, e-mail, IM, P2P and network shields, boot-time scanning, and a behavioural blocker. The new version 6 brings even more features including an internet site ratings plugin, script malware protection and a limited (non-configurable) sandboxing feature. Although the sandbox is a very useful semi-automated security feature, the default settings involves a pop up to ask whether a software should be sandboxed for not - for the typical average user this can be slightly confusing though it can set to sandbox the software automatically. Lastly Avast is relatively light on resources.
Total downloads:
166,914,555
Downlaod safely here
http://download.cnet.com/Avast-Free-Antivirus/3000-2239_4-10019223.html
Freeware : AVG
According to pcmag.com,
AVG Anti-Virus Free 2012 (Free, 4 stars) turned in a star performance for malware cleanup, taking the highest or second highest score in every category. It also scored well in malware blocking, and the independent labs give it good marks. AVG is our current Editors' Choice for free antivirus.\
AVG Technologies is best known for antivirus protection, but in recent years the company has branched out, adding system tune-up, parental control, online backup, and more. But have no fear; you can still get the powerful protection of AVG Anti-Virus Free 2012 without spending a penny. In my tests and in tests by independent labs it beats many of its for-pay competition. Do note that it's specifically free for personal use; business users must pay for AVG's antivirus protection.
The 2012 edition's main screen collapses the previous edition's ten component icons down to six, but adds three new ones to integrate the company's other products. If you use AVG Family Safety ($19.95 direct for three licenses, 4.5 stars), AVG PC Tuneup 2011 ($29.99/year direct, 4 stars), or AVG LiveKive online backup, you can click the icon to link your products. If you don't, naturally the antivirus includes an option to get them.
View SlideshowSee all (18) slides
More
Good Lab Results
All of the labs I follow test AVG's technology and give it generally good ratings. ICSA Labs and West Coast Labs certify it for virus detection; West Coast adds checkmark certification for virus removal as well. In all of the last ten tests by Virus Bulletin, AVG has received VB100 certification.
AVG participates in the on-demand test by AV-Comparatives.org, but not in the retrospective test, which simulates zero-day protection by using old virus signatures. In the on-demand test AVG rated STANDARD, the lowest passing grade.
AV-Comparatives also runs a whole-product dynamic test, challenging products to protect test systems from real-world up-to-the-minute threats. In this test AVG rated ADVANCED, a cut above STANDARD.
The ongoing antivirus certification tests by AV-Test.org are also dynamic tests, emulating a user's real-world experience. Products can receive up to 6 points for protection, repair, and usability, with a total of 11 points required for certification. In the most recent tests under Windows 7, Vista, and XP, AVG averaged 13.17 points.
The article How We Interpret Antivirus Lab Tests explains how I boil down results from the various labs to create the following chart.
AVG Anti-Virus Free 2012 lab tests chart
Very Good Malware Cleanup
AVG installed quickly on my twelve malware-infested test systems. Resistant malware on one system interfered with installation, but installing in Safe Mode solved that one. On half of the test systems AVG detected active threats immediately and requested a reboot to finalize cleanup.
A full scan on my standard clean test system took just 16 minutes, and a repeat scan finished in less than two minutes. That's plenty fast. The average scan time for recent products on this same system is 25 minutes.
I always find it odd that AVG separates rootkit scanning from the whole computer scan. For the test systems infested with rootkits I ran the separate rootkit scan, which added about three minutes.
When I tallied the results I was quite impressed. AVG detected 88 percent, the same as TrustPort Antivirus 2012 ($39.95 direct, 3.5 stars). Of the products tested with this current threat collection, only G Data AntiVirus 2012 ($29.95 direct, 3.5 stars), with 91 percent, detected more.
AVG didn’t clean up perfectly. It left behind executable files for some threats, and even left a few processes running. However, its score of 6.5 points for malware removal is a new high for the current crop of antivirus products, beating out the 6.4 point record held by Malwarebytes' Anti-Malware Free 1.51 (Free, 4 stars).
AVG detected all of the threats that use rootkit technology and scored 6.7 points for rootkit removal, a tie for top score with ZoneAlarm Antivirus + Firewall 2012 ($59.95 direct for three licenses, 3 stars). Bitdefender Antivirus Plus 2012 ($39.95 direct for three licenses, 4 stars) was the next-best rootkit remover, with 6.0 points.
The majority of current products detected all of my scareware samples. Malwarebytes scored a perfect 10, thoroughly cleaning up scareware. AVG was close behind with 9.5 points, the same as BitDefender, Panda Cloud Anti-Virus 1.5 Free Edition (Free, 3.5 stars), and several others.
This is quite an impressive showing, and it parallels the dynamic test results from the labs. For a full explanation of how I come up with these scores see How We Test Malware Removal.
The World's Worst Viruses
The World's Worst Viruses
By Frank Thorsberg,
Earthworms are a boon to the backyard gardener and healers still use leeches to thin a sick patient's blood, but no good has ever come from a computer worm or virus. Computer viruses have become increasingly dangerous and quick-spreading in the last couple of years, wildly proliferating through cyberspace and causing billions of dollars in damage.
Some of the distinctions between different types of malicious code are now blurred, but the classic computer virus is a piece of sneaky code that tells your PC to do something that you usually wouldn't want it to do. Without your knowledge, a virus could wipe out the programs and data on your hard drive or even let someone take over your machine remotely. A virus replicates by embedding itself into programs or system files.
Worms are another type of devious program that, today, typically spread via e-mail or Internet chat programs. With the help of unprotected users' address books, worms such as Klez spread explosively--disrupting networks and businesses. The oldest worms didn't change system files or obliterate data. But as worms got more sophisticated, the newer ones started to behave more like viruses, doing considerable damage. For example, Klez can delete files and create the mechanism to run itself on system startup.
A third general classification of malevolent code is the Trojan horse. This destructive program poses as an innocent application or file, such as a screen saver or photo. Unlike worms and viruses, Trojan horses don't replicate.
Some viruses and worms won't destroy your data, while others do tremendous damage. For example, the LoveLetter virus overwrote files and inserted viral code on hard drives around the globe two years ago.
"As far as what [virus writers] can do, the sky is the limit," says April Goostree, virus manager for McAfee.com. "In the antivirus industry, we never say 'never' anymore. Because as soon as you do, you are going to be proven wrong. It's anybody's guess about what the next virus will do."
Here's a look at ten of the most malignant viruses and worms of all time.
10. Surreptitious Sircam
Sircam appeared in July 2001 on PCs running Windows 95, 98, and Me. The worm appeared in e-mail in-boxes with an attachment; the body of the message was in Spanish or English. Typical greetings included "Hi! How are you?" and "Hola como estas?" If you launched the attachment, Sircam installed itself on the infected computer, then grabbed random documents and sent them out to e-mail addresses it captured from your address book. It also occasionally deleted files and filled the infected computer's hard drive with gibberish. Visit Symantec's Security Response for instructions on how to remove Sircam.
9. Red Raider
Code Red burned brightly in the summer of 2001, infecting hundreds of thousands of computers--mainly on corporate networks. Code Red slithered through a hole in Internet Information Server (IIS) software, which is widely used to power Internet servers, then scanned the Internet for vulnerable systems to infect and continue the process. The worm used contaminated PCs as weapons in denial of service attacks--flooding a Web site with a barrage of information requests. The original target was the official White House Web site, but government officials changed the site's IP address to thwart the attack.
The worm exploited a weakness in the IIS software (which has since been fixed with a patch from Microsoft) that allowed an intruder to run arbitrary code on a victimized computer. Multiple variants of this worm now exist. Visit Symantec's Security Response for instructions on how to protect your system from Code Red.
8. Bad Benjamin
Benjamin--a new breed of worm--was let loose in May 2002, and it affected users of the popular file-sharing program Kazaa. The crafty worm posed as popular music and movie files. Kazaa users thought they were downloading a media file to their machines, but they got the imposter instead. It then set up a Kazaa share folder and stuffed it with copies of itself posing as popular music and movie files, which other Kazaa users would download. It congested the system's network connection and would ultimately fill up a hard drive. Visit Symantec's Security Response for instructions on how to remove Benjamin.
7. Numbing Nimda
Nimda (also known as the Concept Virus) appeared in September 2001, attacking tens of thousands of servers and hundreds of thousands of PCs. The worm modified Web documents and executable files, then created numerous copies of itself. The worm spread as an embedded attachment in an HTML e-mail message that would execute as soon as the recipient opened the message (unlike the typical attached virus that requires manual launching of the attachment). It also moved via server-to-server Web traffic, infected shared hard drives on networks, and downloaded itself to users browsing Web pages hosted on infected servers. Nimda soon inspired a crowd of imitators that followed the same pattern. Visit Symantec's Security Response for the Nimda removal tool.
6. Tennis Anyone?
The Anna Kournikova (or VBS.SST@mm) worm, appearing in February 2001, didn't cause data loss, although in the process of boosting the profile of its namesake, the Russian tennis player, it did cause embarrassment and disruption for many personal and business users. The worm showed up in Microsoft Outlook users' e-mail in-boxes with an attachment (supposedly a picture of Kournikova). The attachment proved hard to resist. The result? Clicking the bogus attachment sent copies of the worm via e-mail to all addresses found in the victim's Outlook address book. Kournikova also brought about a number of copycat variants. Visit Symantec's Security Response for instructions on how to remove Kournikova.
Most worm creators have never been identified, but a 21-year-old Dutchman, Jan de Wit, admitted to unleashing this worm. The admitted virus writer is appealing a 150-hour community service sentence handed down in September 2001 by a judge in the Netherlands.
5. (Expletive Deleted) Explorer
The Explorer.zip worm appeared in the summer of 1999, following in the footsteps of Melissa. The worm deleted Word, Excel, and PowerPoint files and randomly altered other types of files. Like Melissa (see below), Explorer traveled via e-mails that appeared to be from someone the recipient knew. The message included a file that, if activated, showed a fake error message to the user. Unlike Melissa, this virus did not use Outlook to gather e-mail addresses. Instead, it watched the in-box of the infected computer and then sent automatic replies to senders, using the same e-mail subject as the original message.
4. Maniacal Magistr
Magistr is one of the most complex viruses to hit the Internet. Its victims, users of Outlook Express, were hooked by an infected e-mail attachment. The virus, discovered in mid-March 2001, sent garbled messages to everyone in the infected user's e-mail address book. Attached were files pulled at random from the infected PC's hard drive plus an executable file with the Magistr code. This virus was not as widespread as many others, but it was very destructive. Magistr overwrites hard drives and erases CMOS and the flashable BIOS, preventing systems from booting. It also contained antidebugging features, making it hard to detect and destroy. Visit Symantec's Security Response for instructions on how to remove Magistr.
3. Malevolent Melissa
The Melissa virus swamped corporate networks with a tidal wave of e-mail messages in March 1999. Through Microsoft Outlook, when a user opened an e-mail message containing an infected Word attachment, the virus was sent to the first 50 names in the user's address book. The e-mail fooled many recipients because it bore the name of someone the recipient knew and referred to a document they had allegedly requested.
So much e-mail traffic was generated so quickly that companies like Intel and Microsoft had to turn off their e-mail servers. The Melissa virus was the first virus capable of hopping from one machine to another on its own. And it's another good example of a virus with multiple variants. Visit Symantec's Security Response for instructions on how to remove Melissa.
2. Klez the Conquerer
The Klez worm, which blends different virus traits, was first detected in October 2001. Klez distributes itself like a virus, but sometimes acts like a worm, other times like a Trojan horse. Klez isn't as destructive as other worms, but it is widespread, hard to exterminate--and still active. In fact, so far, no other virus has stayed in circulation quite like Klez. It spreads via open networks and e-mail--regardless of the e-mail program you use. Klez sometimes masquerades as a worm-removal tool. It may corrupt files and disable antivirus products. It pilfers data from a victim's e-mail address book, mixing and matching new senders and recipients for a new round of infection. Visit Symantec's Security Response for instructions on how to remove Klez.
1. Love Hurts
LoveLetter is the worm everyone learned to hate in spring 2000. The infection affected millions of computers and caused more damage than any other computer virus to date. Users were infected via e-mail, through Internet chat systems, and through other shared file systems. The worm sent copies of itself via Microsoft Outlook's address book entries. The mail included an executable file attachment with the e-mail subject line, "ILOVEYOU." The worm had the ability to overwrite several types of files, including .gif and .jpg files. It modified the Internet Explorer start page and changed Registry keys. It also moved other files and hid MP3 files on affected systems. Visit Symantec's Security Response for instructions on how to remove LoveLetter.
Your Best Defense
The best defense against virus attacks is a good offense. Without proper protection, computer worms can spread like wildfire. From minor annoyances to major epidemics meant to cripple giant Web sites, these tenacious trespassers cost us billions of dollars. Here are several tips to help you keep these troublemakers at bay.
1. Don't open any e-mail attachments that look suspicious or come from unknown senders. Be on the lookout for e-mails from people you know, but with language or style they wouldn't normally use--this should raise a red flag.
2. Install an antivirus program such as Symantec's Norton AntiVirus or McAfee's VirusScan. Take the time to install your vendor's updates on your PC.
3. Go to Symantec Security Response and McAfee.com Virus Information for the companies' latest security alerts, disinfecting instructions, and archives.
4. Stay on top of patches created by other software vendors to thwart new threats and programming vulnerabilities. By registering your software after purchase, you'll be notified by the maker when updates are available. Make sure you review and install the necessary critical updates and fixes available through Windows Update.
5. Visit other expert sites to keep up to date on virus news. Carnegie Mellon University's CERT Coordination Center is a great place to find out about the latest virus alerts and vulnerabilities. The organization publishes many statistics and offers security advice for Web site operators.
6. For detailed advice on how to deal effectively with viruses and select the best antivirus software, check out "Protect Your PC."
source :
http://www.pcworld.com
By Frank Thorsberg,
Earthworms are a boon to the backyard gardener and healers still use leeches to thin a sick patient's blood, but no good has ever come from a computer worm or virus. Computer viruses have become increasingly dangerous and quick-spreading in the last couple of years, wildly proliferating through cyberspace and causing billions of dollars in damage.
Some of the distinctions between different types of malicious code are now blurred, but the classic computer virus is a piece of sneaky code that tells your PC to do something that you usually wouldn't want it to do. Without your knowledge, a virus could wipe out the programs and data on your hard drive or even let someone take over your machine remotely. A virus replicates by embedding itself into programs or system files.
Worms are another type of devious program that, today, typically spread via e-mail or Internet chat programs. With the help of unprotected users' address books, worms such as Klez spread explosively--disrupting networks and businesses. The oldest worms didn't change system files or obliterate data. But as worms got more sophisticated, the newer ones started to behave more like viruses, doing considerable damage. For example, Klez can delete files and create the mechanism to run itself on system startup.
A third general classification of malevolent code is the Trojan horse. This destructive program poses as an innocent application or file, such as a screen saver or photo. Unlike worms and viruses, Trojan horses don't replicate.
Some viruses and worms won't destroy your data, while others do tremendous damage. For example, the LoveLetter virus overwrote files and inserted viral code on hard drives around the globe two years ago.
"As far as what [virus writers] can do, the sky is the limit," says April Goostree, virus manager for McAfee.com. "In the antivirus industry, we never say 'never' anymore. Because as soon as you do, you are going to be proven wrong. It's anybody's guess about what the next virus will do."
Here's a look at ten of the most malignant viruses and worms of all time.
10. Surreptitious Sircam
Sircam appeared in July 2001 on PCs running Windows 95, 98, and Me. The worm appeared in e-mail in-boxes with an attachment; the body of the message was in Spanish or English. Typical greetings included "Hi! How are you?" and "Hola como estas?" If you launched the attachment, Sircam installed itself on the infected computer, then grabbed random documents and sent them out to e-mail addresses it captured from your address book. It also occasionally deleted files and filled the infected computer's hard drive with gibberish. Visit Symantec's Security Response for instructions on how to remove Sircam.
9. Red Raider
Code Red burned brightly in the summer of 2001, infecting hundreds of thousands of computers--mainly on corporate networks. Code Red slithered through a hole in Internet Information Server (IIS) software, which is widely used to power Internet servers, then scanned the Internet for vulnerable systems to infect and continue the process. The worm used contaminated PCs as weapons in denial of service attacks--flooding a Web site with a barrage of information requests. The original target was the official White House Web site, but government officials changed the site's IP address to thwart the attack.
The worm exploited a weakness in the IIS software (which has since been fixed with a patch from Microsoft) that allowed an intruder to run arbitrary code on a victimized computer. Multiple variants of this worm now exist. Visit Symantec's Security Response for instructions on how to protect your system from Code Red.
8. Bad Benjamin
Benjamin--a new breed of worm--was let loose in May 2002, and it affected users of the popular file-sharing program Kazaa. The crafty worm posed as popular music and movie files. Kazaa users thought they were downloading a media file to their machines, but they got the imposter instead. It then set up a Kazaa share folder and stuffed it with copies of itself posing as popular music and movie files, which other Kazaa users would download. It congested the system's network connection and would ultimately fill up a hard drive. Visit Symantec's Security Response for instructions on how to remove Benjamin.
7. Numbing Nimda
Nimda (also known as the Concept Virus) appeared in September 2001, attacking tens of thousands of servers and hundreds of thousands of PCs. The worm modified Web documents and executable files, then created numerous copies of itself. The worm spread as an embedded attachment in an HTML e-mail message that would execute as soon as the recipient opened the message (unlike the typical attached virus that requires manual launching of the attachment). It also moved via server-to-server Web traffic, infected shared hard drives on networks, and downloaded itself to users browsing Web pages hosted on infected servers. Nimda soon inspired a crowd of imitators that followed the same pattern. Visit Symantec's Security Response for the Nimda removal tool.
6. Tennis Anyone?
The Anna Kournikova (or VBS.SST@mm) worm, appearing in February 2001, didn't cause data loss, although in the process of boosting the profile of its namesake, the Russian tennis player, it did cause embarrassment and disruption for many personal and business users. The worm showed up in Microsoft Outlook users' e-mail in-boxes with an attachment (supposedly a picture of Kournikova). The attachment proved hard to resist. The result? Clicking the bogus attachment sent copies of the worm via e-mail to all addresses found in the victim's Outlook address book. Kournikova also brought about a number of copycat variants. Visit Symantec's Security Response for instructions on how to remove Kournikova.
Most worm creators have never been identified, but a 21-year-old Dutchman, Jan de Wit, admitted to unleashing this worm. The admitted virus writer is appealing a 150-hour community service sentence handed down in September 2001 by a judge in the Netherlands.
5. (Expletive Deleted) Explorer
The Explorer.zip worm appeared in the summer of 1999, following in the footsteps of Melissa. The worm deleted Word, Excel, and PowerPoint files and randomly altered other types of files. Like Melissa (see below), Explorer traveled via e-mails that appeared to be from someone the recipient knew. The message included a file that, if activated, showed a fake error message to the user. Unlike Melissa, this virus did not use Outlook to gather e-mail addresses. Instead, it watched the in-box of the infected computer and then sent automatic replies to senders, using the same e-mail subject as the original message.
4. Maniacal Magistr
Magistr is one of the most complex viruses to hit the Internet. Its victims, users of Outlook Express, were hooked by an infected e-mail attachment. The virus, discovered in mid-March 2001, sent garbled messages to everyone in the infected user's e-mail address book. Attached were files pulled at random from the infected PC's hard drive plus an executable file with the Magistr code. This virus was not as widespread as many others, but it was very destructive. Magistr overwrites hard drives and erases CMOS and the flashable BIOS, preventing systems from booting. It also contained antidebugging features, making it hard to detect and destroy. Visit Symantec's Security Response for instructions on how to remove Magistr.
3. Malevolent Melissa
The Melissa virus swamped corporate networks with a tidal wave of e-mail messages in March 1999. Through Microsoft Outlook, when a user opened an e-mail message containing an infected Word attachment, the virus was sent to the first 50 names in the user's address book. The e-mail fooled many recipients because it bore the name of someone the recipient knew and referred to a document they had allegedly requested.
So much e-mail traffic was generated so quickly that companies like Intel and Microsoft had to turn off their e-mail servers. The Melissa virus was the first virus capable of hopping from one machine to another on its own. And it's another good example of a virus with multiple variants. Visit Symantec's Security Response for instructions on how to remove Melissa.
2. Klez the Conquerer
The Klez worm, which blends different virus traits, was first detected in October 2001. Klez distributes itself like a virus, but sometimes acts like a worm, other times like a Trojan horse. Klez isn't as destructive as other worms, but it is widespread, hard to exterminate--and still active. In fact, so far, no other virus has stayed in circulation quite like Klez. It spreads via open networks and e-mail--regardless of the e-mail program you use. Klez sometimes masquerades as a worm-removal tool. It may corrupt files and disable antivirus products. It pilfers data from a victim's e-mail address book, mixing and matching new senders and recipients for a new round of infection. Visit Symantec's Security Response for instructions on how to remove Klez.
1. Love Hurts
LoveLetter is the worm everyone learned to hate in spring 2000. The infection affected millions of computers and caused more damage than any other computer virus to date. Users were infected via e-mail, through Internet chat systems, and through other shared file systems. The worm sent copies of itself via Microsoft Outlook's address book entries. The mail included an executable file attachment with the e-mail subject line, "ILOVEYOU." The worm had the ability to overwrite several types of files, including .gif and .jpg files. It modified the Internet Explorer start page and changed Registry keys. It also moved other files and hid MP3 files on affected systems. Visit Symantec's Security Response for instructions on how to remove LoveLetter.
Your Best Defense
The best defense against virus attacks is a good offense. Without proper protection, computer worms can spread like wildfire. From minor annoyances to major epidemics meant to cripple giant Web sites, these tenacious trespassers cost us billions of dollars. Here are several tips to help you keep these troublemakers at bay.
1. Don't open any e-mail attachments that look suspicious or come from unknown senders. Be on the lookout for e-mails from people you know, but with language or style they wouldn't normally use--this should raise a red flag.
2. Install an antivirus program such as Symantec's Norton AntiVirus or McAfee's VirusScan. Take the time to install your vendor's updates on your PC.
3. Go to Symantec Security Response and McAfee.com Virus Information for the companies' latest security alerts, disinfecting instructions, and archives.
4. Stay on top of patches created by other software vendors to thwart new threats and programming vulnerabilities. By registering your software after purchase, you'll be notified by the maker when updates are available. Make sure you review and install the necessary critical updates and fixes available through Windows Update.
5. Visit other expert sites to keep up to date on virus news. Carnegie Mellon University's CERT Coordination Center is a great place to find out about the latest virus alerts and vulnerabilities. The organization publishes many statistics and offers security advice for Web site operators.
6. For detailed advice on how to deal effectively with viruses and select the best antivirus software, check out "Protect Your PC."
source :
http://www.pcworld.com
Facebook Privacy Policy
Facebook Privacy Policy
Facebook has come under serious fire regarding their privacy policy and the sharing of personal information with advertisers to generate revenue. These things have led to several changed to the social networking giant’s privacy stance, and while many are still skeptical, it seems that the changes are designed to ensure that your personal information stays that way. The former privacy policy was a bunch of law jargon that your average user could never understand. The new policy page, however, utilized FAQs and a simplified language to convey their position on user privacy and the steps they are taking to ensure it.
The Collection of Information
No parent wants their children subjected to endless advertisements designed to tug at their innocence. Facebook collects information on its users regarding interests and hobbies and offers that information up to advertisers for big paydays. If advertisers are getting their hands on the information, who else is accessing it? However, Facebook states that they strongly recommend parental oversight in the information their children are sharing on the internet.
The Sharing of Information
Facebook’s privacy stance offers you the ability to make a profile completely private, however, when you’re teen is posting on a site that isn’t private, the information is viewable by anyone. Due to this dilemma, there is never a truly safe and private haven when considering the use of a social networking site. Predators are crafty, and despite Facebook’s best efforts, they can find a way to your children if you rely only on the site’s privacy policies.
Public Domain
There is a certain element of privacy that everyone is entitled to. However, when one posts things on the internet, not even the best of security standards can protect you. If people are having their identities stolen when using secure credit card processing sites, imagine how easy it can be to access information through a social networking site.
Voluntarily Access
It’s also very important to understand that regardless of Facebook’s Privacy Policy, your child may give their information away by simply “friending” people that they don’t know. When this happens, the dangers can be at an all-time high. Once someone is a part of your child’s friend list, they can access pictures, employment locations, school locations, and anything else they offer up. Any of this information will be used by an online predator to gain the upper hand on your child.
Facebook has done a reasonable job of attempting to protect their users’ privacy. However, like any website, there are no guarantees. The only way to ensure that your children’s private information is kept safe is explaining why they shouldn’t post it at all. This ensures that regardless of a predator’s tactics, they will not be able to show up at school or work to meet your child face to face. Eliminating the threat of this meeting can make a huge difference when considering the safety of y our child. Facebook is a part of everyday life and many parents have embraced it. Just be sure that you’ve familiarized yourself with the Privacy Policy and have explained the dangers to your children.
source :
Facebook Privacy Policy
Facebook has come under serious fire regarding their privacy policy and the sharing of personal information with advertisers to generate revenue. These things have led to several changed to the social networking giant’s privacy stance, and while many are still skeptical, it seems that the changes are designed to ensure that your personal information stays that way. The former privacy policy was a bunch of law jargon that your average user could never understand. The new policy page, however, utilized FAQs and a simplified language to convey their position on user privacy and the steps they are taking to ensure it.
The Collection of Information
No parent wants their children subjected to endless advertisements designed to tug at their innocence. Facebook collects information on its users regarding interests and hobbies and offers that information up to advertisers for big paydays. If advertisers are getting their hands on the information, who else is accessing it? However, Facebook states that they strongly recommend parental oversight in the information their children are sharing on the internet.
The Sharing of Information
Facebook’s privacy stance offers you the ability to make a profile completely private, however, when you’re teen is posting on a site that isn’t private, the information is viewable by anyone. Due to this dilemma, there is never a truly safe and private haven when considering the use of a social networking site. Predators are crafty, and despite Facebook’s best efforts, they can find a way to your children if you rely only on the site’s privacy policies.
Public Domain
There is a certain element of privacy that everyone is entitled to. However, when one posts things on the internet, not even the best of security standards can protect you. If people are having their identities stolen when using secure credit card processing sites, imagine how easy it can be to access information through a social networking site.
Voluntarily Access
It’s also very important to understand that regardless of Facebook’s Privacy Policy, your child may give their information away by simply “friending” people that they don’t know. When this happens, the dangers can be at an all-time high. Once someone is a part of your child’s friend list, they can access pictures, employment locations, school locations, and anything else they offer up. Any of this information will be used by an online predator to gain the upper hand on your child.
Facebook has done a reasonable job of attempting to protect their users’ privacy. However, like any website, there are no guarantees. The only way to ensure that your children’s private information is kept safe is explaining why they shouldn’t post it at all. This ensures that regardless of a predator’s tactics, they will not be able to show up at school or work to meet your child face to face. Eliminating the threat of this meeting can make a huge difference when considering the safety of y our child. Facebook is a part of everyday life and many parents have embraced it. Just be sure that you’ve familiarized yourself with the Privacy Policy and have explained the dangers to your children.
source :
http://www.surfnetkids.com/
Facebook has come under serious fire regarding their privacy policy and the sharing of personal information with advertisers to generate revenue. These things have led to several changed to the social networking giant’s privacy stance, and while many are still skeptical, it seems that the changes are designed to ensure that your personal information stays that way. The former privacy policy was a bunch of law jargon that your average user could never understand. The new policy page, however, utilized FAQs and a simplified language to convey their position on user privacy and the steps they are taking to ensure it.
The Collection of Information
No parent wants their children subjected to endless advertisements designed to tug at their innocence. Facebook collects information on its users regarding interests and hobbies and offers that information up to advertisers for big paydays. If advertisers are getting their hands on the information, who else is accessing it? However, Facebook states that they strongly recommend parental oversight in the information their children are sharing on the internet.
The Sharing of Information
Facebook’s privacy stance offers you the ability to make a profile completely private, however, when you’re teen is posting on a site that isn’t private, the information is viewable by anyone. Due to this dilemma, there is never a truly safe and private haven when considering the use of a social networking site. Predators are crafty, and despite Facebook’s best efforts, they can find a way to your children if you rely only on the site’s privacy policies.
Public Domain
There is a certain element of privacy that everyone is entitled to. However, when one posts things on the internet, not even the best of security standards can protect you. If people are having their identities stolen when using secure credit card processing sites, imagine how easy it can be to access information through a social networking site.
Voluntarily Access
It’s also very important to understand that regardless of Facebook’s Privacy Policy, your child may give their information away by simply “friending” people that they don’t know. When this happens, the dangers can be at an all-time high. Once someone is a part of your child’s friend list, they can access pictures, employment locations, school locations, and anything else they offer up. Any of this information will be used by an online predator to gain the upper hand on your child.
Facebook has done a reasonable job of attempting to protect their users’ privacy. However, like any website, there are no guarantees. The only way to ensure that your children’s private information is kept safe is explaining why they shouldn’t post it at all. This ensures that regardless of a predator’s tactics, they will not be able to show up at school or work to meet your child face to face. Eliminating the threat of this meeting can make a huge difference when considering the safety of y our child. Facebook is a part of everyday life and many parents have embraced it. Just be sure that you’ve familiarized yourself with the Privacy Policy and have explained the dangers to your children.
source :
Facebook Privacy Policy
Facebook has come under serious fire regarding their privacy policy and the sharing of personal information with advertisers to generate revenue. These things have led to several changed to the social networking giant’s privacy stance, and while many are still skeptical, it seems that the changes are designed to ensure that your personal information stays that way. The former privacy policy was a bunch of law jargon that your average user could never understand. The new policy page, however, utilized FAQs and a simplified language to convey their position on user privacy and the steps they are taking to ensure it.
The Collection of Information
No parent wants their children subjected to endless advertisements designed to tug at their innocence. Facebook collects information on its users regarding interests and hobbies and offers that information up to advertisers for big paydays. If advertisers are getting their hands on the information, who else is accessing it? However, Facebook states that they strongly recommend parental oversight in the information their children are sharing on the internet.
The Sharing of Information
Facebook’s privacy stance offers you the ability to make a profile completely private, however, when you’re teen is posting on a site that isn’t private, the information is viewable by anyone. Due to this dilemma, there is never a truly safe and private haven when considering the use of a social networking site. Predators are crafty, and despite Facebook’s best efforts, they can find a way to your children if you rely only on the site’s privacy policies.
Public Domain
There is a certain element of privacy that everyone is entitled to. However, when one posts things on the internet, not even the best of security standards can protect you. If people are having their identities stolen when using secure credit card processing sites, imagine how easy it can be to access information through a social networking site.
Voluntarily Access
It’s also very important to understand that regardless of Facebook’s Privacy Policy, your child may give their information away by simply “friending” people that they don’t know. When this happens, the dangers can be at an all-time high. Once someone is a part of your child’s friend list, they can access pictures, employment locations, school locations, and anything else they offer up. Any of this information will be used by an online predator to gain the upper hand on your child.
Facebook has done a reasonable job of attempting to protect their users’ privacy. However, like any website, there are no guarantees. The only way to ensure that your children’s private information is kept safe is explaining why they shouldn’t post it at all. This ensures that regardless of a predator’s tactics, they will not be able to show up at school or work to meet your child face to face. Eliminating the threat of this meeting can make a huge difference when considering the safety of y our child. Facebook is a part of everyday life and many parents have embraced it. Just be sure that you’ve familiarized yourself with the Privacy Policy and have explained the dangers to your children.
source :
http://www.surfnetkids.com/
Jenayah maya tanpa sempadan
Jenayah maya tanpa sempadan
MENYEDARI dunia Internet adalah suatu alam terbuka untuk mereka yang mahu merebut peluang menjadi kaya, seorang lelaki warganegara Switzerland tidak mahu ketinggalan mengambil kesempatan itu.
Tambah menyeronokkan hati peguam berusia 40-an itu adalah apabila berkenalan dengan seorang lelaki dari Malaysia melalui sebuah laman sosial. Dia teruja kerana menganggap pencariannya bakal membuahkan hasil lumayan.
Lelaki yang ditemui melalui jaringan maya itu memperkenalkan diri sebagai seorang ahli perniagaan yang menjalankan bisnes eksport bahan-bahan mentah penternakan dan memiliki syarikat yang berpangkalan di Malaysia.
Peguam itu ditawarkan sebuah kontrak perniagaan mengeksport bekalan makanan ayam ke Hong Kong, tetapi diminta membayar sejumlah wang terlebih dahulu bagi memastikan kontrak tersebut tidak terlepas ke tangan orang.
Teruja dengan tawaran yang tidak disangka-sangka itu, peguam itu menurut sahaja kemahuan 'ahli perniagaan' itu. Wang sejumlah RM1,360,079.50 pun telah dipindahkan ke dalam akaun lelaki tersebut.
Begitupun, oleh kerana tiada apa-apa yang berlaku dalam tempoh masa yang terlalu panjang, dia yang mempunyai latar belakang undang-undang itu telah melakukan penyiasatan sendiri terhadap syarikat tersebut dengan maklumat yang ada.
Luluh hatinya apabila mendapati syarikat tersebut palsu dan tidak pernah wujud di Malaysia. Tidak mahu si penipu siber itu terlepas begitu sahaja, dia telah melaporkan kes itu kepada pihak berkuasa.
Mujur tindakan pantas pihak polis telah berjaya menangkap dua individu, seorang lelaki dan wanita berhubung kes tersebut. Itu merupakan salah satu kes jenayah siber di negara ini.
Pada 15 Jun lalu, negara digemparkan pula dengan serangan alam siber yang ditunjangi penggodam antarabangsa. Dikenali sebagai Anonymous menerusi Operation Malaysia, kesan buruk penggodamannya amat serius.
Dalam serangan tersebut, sebanyak 91 buah laman web telah mengalami gangguan perkhidmatan.
Terdedah ancaman
Kegiatan jenayah dan salah laku siber tidak hanya melumpuhkan laman web, malah sesiapa sahaja boleh terdedah kepada ancaman tanpa sempadan itu.
Ia terbukti apabila CyberSecurity Malaysia melalui Pusat Bantuan Cyber999 telah mencatatkan sebanyak 14,157 insiden keselamatan siber yang dilaporkan oleh pengguna Internet di seluruh Malaysia dari bulan Januari sehingga November 2011.
Jumlah tersebut menunjukkan berlaku peningkatan mendadak sebanyak 97 peratus berbanding tempoh yang sama pada tahun lalu.
Mengikut istilahnya, jenayah siber merujuk kepada perbuatan atau insiden yang dilakukan di alam siber, sama ada menggunakan komputer mahupun peralatan seperti perkakasan dan perisian telekomunikasi.
"Ia dilakukan dengan menggunakan telefon pintar atau peranti teknologi maklumat dan komunikasi (ICT), dengan teknologi Internet digunakan sebagai perantara dan tidak melibatkan perbuatan jenayah secara fizikal.
"Sebagai contoh, penjenayah ini menceroboh maklumat organisasi atau individu, harta intelektual, penipuan kad kredit, kecurian identiti, penggodaman ke atas sistem rangkaian komputer dan laman web organisasi mahupun individu," kata Ketua Pegawai Eksekutif CyberSecurity Malaysia, Lt. Kol. (Bersara) Prof. Datuk Husin Jazri ketika ditemui Kosmo!.
Husin menjelaskan, setiap aktiviti jenayah siber yang dilakukan mempunyai motif atau tujuan tersendiri seperti membalas dendam, marah, berhibur sekadar suka-suka, kewangan dan politik.
Di kebanyakan negara, landskap jenayah siber yang berlaku kesemuanya hampir sama.
Laporan insiden
Di negara ini, CyberSecurity Malaysia mengklasifikasi kategori jenayah atau ancaman siber berdasarkan data laporan insiden keselamatan siber melalui penggunaan Internet yang dikumpulkan Pusat Bantuan Cyber999.
PENIPUAN melibatkan kad kredit juga merupakan salah satu kaedah yang digunakan oleh penjenayah siber.
Statistik yang dikumpul melalui pusat bantuan tersebut dikenali sebagai insiden keselamatan siber, dan tidak dikategorikan sebagai jenayah siber.
Antara insiden keselamatan siber yang dikenal pasti adalah seperti penipuan, spam, pencerobohan, kod berbahaya, cubaan pencerobohan, gangguan siber, laporan kerentanan (vulnerabilities), gangguan perkhidmatan (DoS) dan juga berkaitan kandungan.
Husin memberitahu, terdapat beberapa punca atau sebab berlakunya peningkatan insiden tersebut. Antaranya adalah jumlah pengguna Internet yang semakin bertambah dari semasa ke semasa dan kurang pengetahuan mengenai kepentingan keselamatan siber.
Pusat Bantuan Cyber999 juga banyak menerima laporan insiden keselamatan Internet berkaitan penggunaan media sosial.
"Ada dalam kalangan pengguna Internet yang kurang arif dan juga kurang berhati-hati sewaktu melayari Internet," ujar beliau.
Justeru, peluang tersebut memudahkan lagi penjenayah siber untuk mengambil kesempatan ke atas mereka.
Selain daripada itu, terdapat juga peningkatan ancaman-ancaman penggodaman seperti pencacatan laman web (web defacement) dan juga pencerobohan.
Kelemahan utama yang menjadi sasaran kebanyakan penjenayah siber ialah pihak yang menggunakan penyelesaian sekuriti tidak asli dan yang luput tarikh sah.
Menurut Pengarah Saluran Jualan Kaspersky Lab Asia Tenggara, Jimmy Fong, dalam satu kenyataan akhbar, pengguna peranti teknologi seperti komputer, telefon pintar, tablet dan peranti lain, ia seumpama seseorang yang meninggalkan pintu dan tingkap rumah dalam keadaan terbuka.
"Dalam situasi perbandingan tersebut, pengguna seolah-olah berharap tiada sesiapa yang akan masuk ke dalam rumah seterusnya menyalah guna atau mencuri hak miliknya.
"Di dalam kes ini, ia melibatkan data dan identiti anda," katanya.
sumber :KOSMO
Thursday, December 22, 2011
Subscribe to:
Posts (Atom)