Download Free Adobe Photoshop Lightroom 3

Thursday, October 29, 2009

Adobe Photoshop Lightroom is one software for those want-to-be and professional photographers. You can enhance and showcase images with Adobe Photoshop Lightroom 3 and its much easier to organise. Here is how you can download it for free.




Some of the new features in the new Lightroom 3 are:

♦ New import handling designed to make importing streamlined and easy

♦ State-of-the-art noise reduction to help you perfect your high ISO shots

♦ Flexible customizable print package creation so your print package layouts are all your own

♦ Watermarking tool that helps you customize and protect your images with ease

♦ Brand new performance architecture, building for the future of growing image libraries

Download Free Adobe Photoshop Lightroom 3

[Read More...]

Uniblue SpeedUpMyPC 2009

Hi friends, this promo actually been around since 1 month ago, but still valid for today, for those who still seek a license for this software can get it now. Lets start.



SpeedUpMyPC requires the latest Microsoft .NET 3.5 framework, and will automatically install .NET itself, if your system doesn’t already have it. As a result the installation may take several minutes longer than expected – please be patient.

If you encounter any issues with SpeedUpMyPC 2009 installation, you can try installing Microsoft .NET 3.5 framework first from here.

So, if you’re not already using .NET 3.5 framework, it’s up to each one of you to decide if you want to install it or not



Key Benefits

* Superior performance from your PC
Fine-tune your PC, and your Windows operating system, to help you squeeze even more power from your computer, for improved performance and faster startup.

* Maximize you Internet settings for faster browsing
Optimize your network and Internet connections to boost your bandwidth, allowing you to enjoy faster surfing and quicker downloads.

* Enhanced Security and Privacy Features
Protect your privacy by securely removing a wide range of sensitive files and records, including browser histories, cookies and saved form information.

* Detailed metrics on system performance
Advanced and detailed charts track CPU, memory and network usage showing the load on system resources and indicating areas to be targeted for optimization.

* Memory cleanup
Reduce hard disk clutter by finding and deleting unnecessary and obsolete files, while the powerful uninstall feature lets you totally remove unwanted software more effectively.

* Safe, simple and trusted
With improved graphics, and the reassurance of the Recovery center (to undo changes) Uniblue’s SpeedUpMyPC is trusted by users everywhere to deliver improved performance.

FEATURES

New features

Automatic optimization and cleanup
Quarantine manager
CPU profile management
Memory freeup
Network usage overview
Network / connectivity tweaks
Microsoft Internet Explorer tweaks
Mozilla Firefox tweaks
Windows performance tweaks
Hard drive tweaks
Windows XP user interface tweaks
Windows Vista user interface tweaksWindows startup optimization
Remote access service tweaks
Host service tweaks
Recovery center to undo changes
Advanced GUI features
Widget

User Interface

Windows Familiar GUI
System Tray Shortcut
Automatic Performance Scan
System Optimization State
System Overview and Recommendations
Extensive Manual and Help
Detailed System GraphsLiveUpdate

Optimization

CPU Usage Overview
Disk Analyzer
Application Booster
Internet Speed Analyzer
Memory Usage Overview
Internet Speed Optimizer
RAM Optimization
Startup Manager
Disk Usage
Process Viewer

Cleanup

Junk file cleanup scan
Uninstall Manager
Detailed junk file cleanup scan results
Detailed privacy protection scan results
Privacy protection scan

Settings

Launch application at startup
Check for updates every time SpeedUpMyPC starts
Start scanning when the application loads
Perform automatic optimization and cleanup
after each scan

Recommended system requirements:
* Intel Pentium 4 1GHz or equivalent processor
* 512 MB RAM
* 200 MB free hard disk space
* Graphics mode 1024×768 high color (highest 32-bit)
* Internet Explorer 6
* Microsoft Windows XP or Vista (32-bit)
* .Net Framework 3.5 (included as part of the SpeedUpMyPC installation process)

Grab It :
A. Go to this promotional page andfill in your names and email address:

http://mag.uniblue.com/camag/uk/sp/signup/
( copy and browse in your browser )

B. You’ll soon receive an email message containing all that you need : the download link, serial number and installation instructions.

That’s it! Enjoy everyone

[Read More...]

How To Increase Your Customer Base

Tuesday, October 27, 2009

The more the customers you have, the better your chances of making money. The article, helps you make money online by showing you how to increases the customer list.

An entrepreneur usually begins the home-based business online as a small one-person operation, but with hopes of transmuting the hobby or lifestyle choices into a functional and profitable business. In order for the business to grow, the business owner must increase the number of customers served, or the intensity of the order stream must be increased. A third option is to add new products or services that appeal to more potential customers. Here are some tips you can use that will allow you to increase your customer base while you make money online.


Narrow your focus

Surprisingly enough, one way to increase your customer base and make money online is to narrow the scope of your advertising and marketing efforts. If you've been using a scattergun approach, your marketing campaigns may not always reach the people who are most likely to purchase your product or service. In the world of marketing, more is not necessarily better. By choosing your product characteristics and matching your marketing efforts to the people who are most likely to use your product, you will have more targeted advertising and you are much more likely to be in contact with the individuals who are going to use your service.

Know your market

Before you can increase your customer base, you must understand who your customers are. If you approach marketing without understanding the dynamics of your customers, much of your advertising efforts will be wasted. You may think that you want to sell to everyone who gets on the Internet, but your customer base is more likely to increase if you are aiming your marketing efforts at the characteristics of the people who are going to have an interest in your product or service already. In other words, if you are marketing sheet music for the dulcimer, you probably won't find too many customers in the bass guitar music web sites, so if your advertising is limited to the wrong site, you are less likely to make money online.

Price it right

Related to the advice to know your market is the idea of pricing your product correctly. You don't want customers to look at the product or scroll to the bottom of the web page to check the price and go on to another page. You won't commonly get into a price discussion if the customer believes it is way too high for the item or service. The customer wants to get the best possible price on the product and so does the seller, usually there is a significant difference between the want of the customer and the price of the product. You can't make money online if the customer is not willing to pay the price you set.

Ask them again

Repetition is often the only way to turn a visitor into a purchaser and make money online. When a customer sees a business name several times, they are more likely to gain name recognition through consistent viewing of your company name or logo. When it comes time to purchase the product in the normal course of living; the effective advertising plan will make sure to ask the targeted consumer to purchase the product using more than one means of expression.

credit:bravenet

[Read More...]

ANOTHER WORLD IS REALLY EXIST? Perhaps the Past Finding Sainstis

world scientists joined at CERN created the largest machines in the history of world science. Machinery worth U.S. $ 6 Billion Dollar named LHC, Large Hadron Collider. This giant machine is made to prove the existence of "The God Particle," Higgs Boson, mysterious particles that he said would show "big secret" of the universe.



Of how the universe began, and how everything in the universe works. From the stars, planets and giant galaxies to subatomic particles smallest. You can see this machine in the movie "Angels and Demons" (2009), starring Tom Hanks.

But that's not all. This giant machine is also made to prove one thing. The existence of the Multiverse, another world.

Throughout history, humans have believed existed. Another world than our world. Many believe there is a scary world. A cursed place dark and terrible, where spirits, ghosts and the demons dwell and come to our world.

But of course the experts predict a parallel world is not like that at all. Prof. Michio Kaku even jokingly said parallel world may contain a version of Elvis Presley is still alive.

And it all started in the year 1909,
A physicist named Geoffrey Taylor found that a single point light (photon) in his experiments proved terinterfensi, an interruption in the wave that should, no. He was confused how can terinterfensi, what might menginterfensinya?

Until he finally got a conclusion that widened the eyes of the world scientists. Geoffrey became the first person in the world, scientifically, to detect the existence of a parallel universe ( "25 Big Ideas," The Science That's Changing Our World ", Robert Matthews, 2005).

In 1925, Erwin Schrödinger when he was researching the electron, he discovered something very strange. Electrons, can change shape, from particle to wave, and vice versa. But not only that, an electron, it turns out, can be in two places, simultaneously. And other places that are not in this world, but elsewhere, in another world. Imagine the insanity. As there are two versions of yourself, which one was in another place, even in another world.

October 1927. In the town of Solvay, Belgium, big event took place. In the city held a big meeting. Meeting of the greatest scientists in human history. Among including Niels Bohr, Heisenberg, Schrodinger, Max Planck and of course, Albert Einstein. More open and there was a magic world.

Responding to the magic world of quantum, Einstein had said, "God did not play dice". In Newton's laws, and everything must be measurable, in the quantum world, nothing is really certain, that there is, only probability (Uncertanity Principle, Heisenberg). And since the existence of quantum world becomes more and more popular throughout the world.



With the discovery of the quantum world of super magic, the scientists also found a new great challenge. Law of nature, between a large universe (stars, planets, galaxies etc. based on Newton's law and Special Relativity, is very different from the laws of nature subatomic, atomic particles and small super quarks. World macroscopic vs microscopic world.

They tried hard to unite the two conflicting laws of nature were in a dream world's greatest scientists since Einstein. Discover "The Theory of Everything", Theory of Everything (GUT, General Unified Theory, GUT No. No Glory).

"Theory of Everything" is the greatest theory, which will unify all of nature theory and harmony of nature's smallest in the beautiful and elegant. And they found a possible answer. String Theory. The theory which states that the universe was not formed by atomic particles, but by a universal set of strings (String, such as guitar and violin strings).

Harmonization of these strings, which determine the shape of everything, all things in the universe, from the smallest to the largest. But in order to perfect the theory, the theory also reveals the possibility of other dimensions, a new dimension other than what we know so far.



Now, the question was no longer "Is there another world?", But has become, "It's what's really another world? Two, three, infinity ". We may soon know the answer.

And what is there?
The experts estimate the world will be much like our world, but slightly different, similar, but not exactly the same. Maybe there will be the same solar system with us, with the sun, stars, planets, Earth, and even those who like us, but perhaps her life is different. Maybe Elvis is still alive there, maybe Napoleon won the war Waterloo and became ruler of Europe. Maybe. How do scientists know? I do not know, let us learn more.

credit:anthneic.blogspot.com

[Read More...]

Ares I-X Secured at the Launch Pad

Wednesday, October 21, 2009

The Ares I-X now is secured on Launch Pad 39B at NASA's Kennedy Space Center in Florida. The test rocket, sitting on a mobile launcher platform, was “hard down” on the pad’s pedestals at 9:17 a.m. EDT. The rotating service structure is expected to be rolled into place at about 12:30 p.m.



Ground teams began rolling out Ares I-X and its launch platform aboard a crawler-transporter from Kennedy’s Vehicle Assembly Building at 1:39 a.m. It arrived at the pad about 7:45 a.m.

Managers will meet at Kennedy on Friday for a Flight Test Readiness Review to thoroughly discuss whether the flight test is ready to proceed and set an official launch date. Currently, Ares I-X is targeted to launch Oct. 27 at 8 a.m.

Launch Vehicle: Ares I-X
Targeted Launch Date: Oct. 27
Launch Window: 8 a.m. - 12 p.m. EDT
Launch Pad: 39B
Launch Site: Kennedy Space Center, Fla.

NASA's first flight test for the agency's next-generation spacecraft and launch vehicle system, called Ares I-X, will bring NASA one step closer to its exploration goals. The flight test will provide NASA with an early opportunity to test and prove flight characteristics, hardware, facilities and ground operations associated with the Ares I.

credit:NASA

[Read More...]

ECB's Trichet: G20 must tackle global imbalances

The Group of 20 rich and developing nations must tackle global economic imbalances in its new role as the key international policy forum, European Central Bank President Jean-Claude Trichet said in comments released on Sunday.




Trichet told Italy's Corriere della Sera newspaper that the G20's new role, backed up by advice from the International Monetary Fund and the Financial Stability Board, would allow a good combination of expert analysis and peer pressure.

"It is particularly important that the G20 is designed to be the premier forum for international economic cooperation," he said, according to an interview transcript published on the ECB's Web site on Sunday.

"The G20 has to address the issues of the domestic large imbalances between savings and investments, and of the set of unsustainable external imbalances.

"We know that these imbalances have been at the roots of the present difficulties. If we don't correct them, we'll have the recipe for the next major crisis. And this of course would be totally unacceptable."

Trichet said central bankers appreciated G20 leaders' commitment to fiscal responsibility and their comments in Friday's Pittsburgh communique that a sense of normalcy should not lead to complacency.

Failing to wind back public stimulus programmes at the right time would damage confidence and delay recovery, he said.

"One thing is sure. When time comes, systemic economies are not credible in going back to sustainable fiscal policy in the mid to long run," he said.

"We won't have the recovery which we are hoping for. Because governments would not inspire confidence to households and corporate business. It is the evaporation of confidence that created this dramatic turmoil. Now we have to do everything to rebuild confidence."

Trichet said U.S. policy makers' commitment to a strong dollar was important in keeping currency markets and the global economy stable, repeating a long-held position. The euro hit a one-year high against the dollar on September 23.

FINANCIAL REFORMS STILL NEEDED

The ECB chief said the recent improvement in financial markets was not surprising, given the actions taken by central banks and governments, and policy makers were keen to see how this would feed into the real economy.

"We monitor with great attention at this stage the interaction between the financial sphere and the real economy," he said.

Trichet urged banks to boost their capital bases and said the Basel committee's proposed new banking rules struck a good balance between taking a long-term view of capital needs and avoiding measures which would stop banks lending.

"With the improvement observed in the financial markets some institutions and market participants might think that there is no need for the reforms designed at global level. It would be plain wrong to think that," he said.

"More than ever it is extremely important to introduce the necessary reforms in the financial system, in order to strengthen its resilience and avoid excessive booms and busts."

The ECB has kept interest rates for the 16-nation euro zone on hold at a record low 1 percent, and no change is expected until after mid-2010.

In the euro zone, Trichet repeated the ECB's earlier assessment that 2009 economic growth would overall be very negative and 2010 would likely show a slightly positive result.

On a quarter-by-quarter basis, growth could turn positive and then relapse into negative territory.

"This doesn't change our main message. Namely, that we have a bumpy road ahead and that the level of uncertainty remains exceptionally high and therefore that prudence and caution are of (the) essence," he said.

credit:newsdaily

[Read More...]

Gates denies rift on Afghan war strategy

U.S. Secretary of Defense Robert Gates said on Wednesday that there was no rift between President Barack Obama's military and civilian advisers on the Afghan war strategy.



"These rumors of some kind of rift are just not accurate and do not reflect the close working effort between our military and civilians," Gates told a news conference during a visit to Japan.

President Hamid Karzai agreed to face a second round of voting in Afghanistan's disputed election on Tuesday after a U.N.-led fraud inquiry tossed out enough of his votes to trigger a run-off.

Karzai's decision eased tensions with the West and removed one stumbling block for U.S. President Barack Obama as he weighs whether to send more troops to Afghanistan to fight a resurgent Taliban.

Many within Obama's Democratic Party have spoken out against sending more troops, while Republican opponents say his lengthy deliberations on a new strategy are undermining U.S. troops and emboldening the Taliban.

Gates reiterated that the problems surrounding the legitimacy of the Afghan government would not be resolved by a runoff alone and described the situation as an "evolutionary process."

"Clearly, having the runoff, getting it behind us and then moving forward is very important, " he said.

"But I think we need to be realistic that the issues of corruption and governance that we are trying to work with the Afghan government on are not going to be solved simply by the outcome of the presidential election. This is going to be a work in progress, an evolutionary process, and we need to be realistic on that."

Obama administration officials have stressed earlier that for Washington to succeed in Afghanistan it is essential that there be a legitimate and credible government in Kabul.

credit:newsdaily

[Read More...]

How to Lose Weight Quickly For Free!

Yes, this is true! You can learn how to lose weight quickly without spending even a penny out of your pocket. All you need to learn is to develop a habit to consume right kind of food that is rich in nutrients, vitamins and minerals while eliminating foods that contain fats and sugar. Dietary fiber is the answer to many problems related to obesity. It helps to fill up your stomach quickly and is very nutritious. Moreover, dietary fiber does not contain any fat which makes it a suitable diet for people who are looking for ways on how to lose weight quickly.

Sure Shot ways to loose pounds with Fat Loss 4 Idiots

You should also include running, jogging, stretching and light weight exercises in your daily schedule so that you burn all that extra fat in your body. Many people tend to say that it is very difficult for them to do exercise daily because of their busy schedules. But if you are looking for ways on how to lose weight quickly, then you need to understand that supplements or medicines to lose weight are not a permanent solution. Moreover, such medicines or supplements have side effects and should not be taken for more than the prescribed time limit. You will have to consider balanced diet and exercises today or tomorrow if you want to stay fit and healthy. So why not today!

However, this is a true fact that all these factors should be combined in a way that they work best for you and this can only be done by a professional. So, if you are looking for ways on how to lose weight quickly and effectively while staying healthy then it is advised that you consult an expert who could guide you on the right path. You may consider referring an e-book or website that can assist you in developing right eating habits and exercise regime.

[Read More...]

Tips on Breast Care for Mothers

Breastfeeding is a wonderful feeling that a woman can experience. It is beneficial for both the baby and the mother in several ways. But breast care is equally important. This will not only give a hygienic supply of milk to the baby but also help mother to maintain the shape and the firmness of her breasts.

This assumes that it is solely a lactating mother's outlook to sustain a good and healthy diet for her breastfeeding child. A mother who gives birth to a large baby that grows fast may experience difficulties in producing and sustaining enough quantities of milk. This is because the fat reserves she had during the pregnancy period can be lost soon after childbirth and eating well enough might become a problem for her.

Keep the nipples washed clean. Beginning from around the fifth month of pregnancy, a viscous fluid is secreted from the breasts. If this is not washed away properly, it may form a crust and the surrounding skin becomes reddish. To prevent this, clean the nipples well everyday with warm water - occasionally adding boric acid powder to the water and dry them by rubbing them lightly with a clean piece of cloth.

Proper breast care begins with the cleanliness of the breast. Women should devote a few minutes of their bathing schedule in pampering the breasts. Since breasts are a spongy mass of tissue enclosed by a skin, they can be washed with the same soap you use for the rest of the body.

Breast enlargement pills use the same concept. Mankind has known such herbs which stimulate growth since ages. These herbs are known to increase the bulk of the breast growth. These herbs contain the plant estrogen, called phytoestrogen. This phytoestrogen has the same function human estrogen has.

Though not proven to cause breast cancer, surgical breast enhancement technique has its vehement protestors. Not wanting to go through the rigors of a surgery and desiring an alternative to the artificial look and feel of a breast implant, more and more women are turning towards non surgical breast enhancement methods like the pill, pump, cream or a special brassiere.

Other common problems like sagging breasts and inverted nipples can be easily combated by proper and precise breast massaging techniques. Finally, breast massages increase the tone and breast and the bust size. This will work well to increase the confidence of the woman, and she will feel good about herself.

In case the nipples appear flat or inverted, it is advised to press the areola between the thumb and the finger to encourage the nipple to stand out. If the nipple sticks out, the baby will not have any difficulty in suckling. During the pregnancy period the shape of the nipple may be abnormal, but it improves as the pregnancy advances. This is because of the effect of hormones during pregnancy.

These hormones are called oxytocin and prolactin. The hormone called oxytocin is stored in the pituitary gland and acts on muscle cells. These muscles surround the milk glands where milk is produced. Oxytocin causes the muscles cells to contract in turn squeezing milk out of the glands into the ducts.

[Read More...]

West Antarctic Ice Sheet May Not Be Losing Ice As Fast As Once Thought

New ground measurements made by the West Antarctic GPS Network (WAGN) project, composed of researchers from The University of Texas at Austin, The Ohio State University, and The University of Memphis, suggest the rate of ice loss of the West Antarctic ice sheet has been slightly overestimated.




"Our work suggests that while West Antarctica is still losing significant amounts of ice, the loss appears to be slightly slower than some recent estimates," said Ian Dalziel, lead principal investigator for WAGN. "So the take home message is that Antarctica is contributing to rising sea levels. It is the rate that is unclear."

In 2006, another team of researchers used data from the Gravity Recovery and Climate Experiment (GRACE) satellites to infer a significant loss of ice mass over West Antarctica from 2002 to 2005. The GRACE satellites do not measure changes in ice loss directly but measure changes in gravity, which can be caused both by ice loss and vertical uplift of the bedrock underlying the ice.

Now, for the first time, researchers have directly measured the vertical motion of the bedrock at sites across West Antarctica using the Global Positioning System (GPS). The results should lead to more accurate estimates of ice mass loss.

Antarctica was once buried under a deeper and more extensive layer of ice during a period known as the Last Glacial Maximum. Starting about 20,000 years ago, the ice began slowly thinning and retreating. As the ice mass decreases, the bedrock immediately below the ice rises, an uplift known as postglacial rebound.

Postglacial rebound causes an increase in the gravitational attraction measured by the GRACE satellites and could explain their inferred measurements of recent, rapid ice loss in West Antarctica. The new GPS measurements show West Antarctica is rebounding more slowly than once thought. This means that the correction to the gravity signal from the rock contribution has been overestimated and the rate of ice loss is slower than previously interpreted.

"The published results are very important because they provide precise, ground-truth GPS observations of the actual rebound of the continent due to the loss of ice mass detected by the GRACE satellite gravity measurements over West Antarctica" said Vladimir Papitashvili, acting director for the Antarctic Earth Sciences Program at the National Science Foundation, which supported the research.

WAGN researchers do not yet know how large the overestimation was. A more definitive correction will be conducted by other researchers who specialize in interpreting GRACE data. Previous estimates of postglacial rebound were made with theoretical models. Assimilation of the direct GPS results into new models will therefore produce significant improvements in estimations of ice mass loss.

The results will appear in the electronic journal Geochemistry, Geophysics, Geosystems of the American Geophysical Union and the American Geochemical Society.

A team from The University of Texas at Austin's Jackson School of Geosciences (Ian Dalziel, lead principal investigator), The Ohio State University's School of Earth Sciences (Michael Bevis), and The University of Memphis' Center for Earthquake Research and Information (Robert Smalley, Jr.) performed the WAGN project.

The network consists of 18 GPS stations installed on bedrock outcrops across West Antarctica. Precise, millimeter level, three-dimensional locations of the stations, which are bolted into the bedrock, were determined during measurements made from 2001 to 2003 and from 2004 to 2006, the two measurements being at least three years apart. The difference in the positions during the two time periods indicates the motion of the bedrock.

The WAGN data were supplemented with data from the first year of the Polar Earth Observing Network (POLENET) project, a project to establish a more sophisticated, continuously recording network of GPS and seismic stations, including the already established WAGN sites. POLENET will further improve our understanding of the interaction between the solid earth and ice sheets at both poles. The lead principal investigator of the U.S. Antarctic contribution to POLENET is Terry Wilson of The Ohio State University.

The West Antarctic GPS Network and the U.S. Antarctic contribution to the Polar Earth Observing Network of the International Polar Year were both funded and logistically supported by the Office of Polar Programs of the National Science Foundation.

credit:sciencedaily

[Read More...]

Sandboxie: Blocking Web-Based Malware From Your PC

There is no safe neighborhood anywhere on the Internet. Even honest reputable sites, such as The New York Times, can inadvertently serve up malware. If you don't keep all the software on your computer patched with the latest bug fixes, you are constantly at risk – malware exploits known bugs to install itself.

Now that Windows does a reasonably good job of self-updating, the bad guys have taken to attacking other software, such as the Adobe Acrobat Reader and the Flash player plug-in, which don't automatically install patches as well as Windows does. And, up to date antivirus software only provides limited protection.



Enter Sandboxie, an excellent program that builds a virtual sandbox around your web browser, making it impossible for your computer to accidentally get infected.

When you run a program in a sandbox, you are really running Sandboxie and it, in turn, is running the program in a walled-off virtual box. Originally developed for Internet Explorer, Sandboxie can now put a sandbox around any Windows program.


Programs running a sandbox can, by default, see everything on the computer. What they can't do is make any permanent changes. When sandboxed programs try to read files, Sandboxie does not interfere. However, when they try to create new files, Sandboxie intercepts the requests and creates the files in another location. The running program is oblivious to this re-direction. It thinks it's talking to Windows, but it really is talking to Sandoxie. The movie The Truman Show offers a pretty good analogy.


If anything malicious gets accidentally installed on your computer while browsing with a sandboxed browser, it lives only in the sandbox. Specifically, the malware may think it got installed into C:\Program Files, but it actually lives in C:\Sandbox\youruserid\DefaultBox\drive\C\Program Files. Empty the sandbox and the malicious software is gone. This is shown visually on the home page of sandboxie.com. The initial state of a computer is shown below:



Internet explorer 8 fixes, IE8 fixes

The top checkerboard pattern illustrates a hard disk with no sandbox. In the bottom one, the virtual sandbox is shown as a yellow box.

When a program runs, the changes it makes to the file system and the hard disk are shown as red boxes. In the image below we see that normally the red boxes/changes are scattered all over.



After an application makes changes

However, Sandboxie forces all changes made by a sandboxed program to live inside the sandbox. If any of the changes are not wanted, just empty the sandbox.

If this sounds like virtualizaiton, it is. But it's small, lightweight virtualization, whereas full blown virtualization products are large and cumbersome. Also, the changes Sandboxie makes to your computer are minimal compared to full-fledged desktop virtualization software like that offered by VMware. Has a problem occurred to you? Most likely, there is a simple solution. Sanboxie is nothing if not a well thought out program.

If you don't want malware on your computer, even if it's sandboxed, you can configure a sandbox so that all changes made by any program are discarded as soon as the last program in the sandbox shuts down. You can see this below:



Internet explorer 8 fixes, IE8 fixes

There are two sandboxes on this computer, the default one and another called ThrowMeAway (I chose the name). As the name implies, all changes made in this sandbox are always discarded. If you really want a private browsing mode, this beats them all.

[Read More...]

The Best Security for Wireless Networks

Securing a wireless network isn't a hard task. The cheat sheet is relatively small. However, the technical press continues to be flooded with articles and blogs containing technical mistakes.

Take, for example, everyone's trusted information source, Consumer Reports Magazine. I'm a big fan of the magazine, having subscribed to the hard copy edition for years. But they seem out of their league, when it comes to computers.



On August 6, 2009 a blog posting at the magazine's website suggested using WEP security for wireless networks. This is very poor advice. A week after the posting, an editor corrected it, to say they recommend WPA security. This too, is not the best option. Even after being shamed into a correction, they still got it wrong.

So, let me try to offer up just what most people (and Consumer Reports) need to know about securing a wireless network.

Starting at the Beginning

To begin with, there are four types of Wi-Fi networks (A, B, G and N). But the security is not tied to any one type.

If you can connect to a wireless network without entering a password, then there is no security. In this context, the term "security" refers to encrypting data as it travels over the air.

The idea being to prevent a bad guy from capturing all the information coming into and out of a victims' computer and, in effect, looking over their shoulder despite being a few hundred feet away.

Wi-Fi networks offer three security options: WEP, WPA and WPA2. As a simplistic introduction, think of WEP as bad, WPA as just fine and WPA2 as great.

WEP is the oldest security option and it has been shown to be very weak. It may be better than no security at all, but not by much. Don't use it. Other than Consumer Reports magazine, the last recommendation to use WEP was issued in 2005.

WPA is technically a certification, not a security standard, but since it includes only one security protocol, TKIP, they are often confused. When people refer to WPA security, they are really referring to the TKIP protocol.

The combination of WPA and TKIP is not the best, but it's reasonably good. If you have a choice, you should opt for the best security (next topic), but if you don't have a choice (more later) TKIP is reasonably strong.

WPA2 is also, technically, a certification rather than a security standard. WPA2 includes two security standards: TKIP and CCMP. If you are using TKIP, it doesn’t matter whether the router is WPA or WPA2. TKIP is TKIP either way.

The best security option is CCMP and it's only available in WPA2, so, here again, the security protocol is often confused with the certification. When people refer to WPA2 security, they are really referring to CCMP.

But no one refers to CCMP (don't ask what it stands for). For whatever reason, the CCMP security protocol is referred to, incorrectly, as AES. So, when you are configuring a router, you need to first select WPA2, then you need to select AES (rather than TKIP) to get the best possible security and encryption.

WPA TKIP Flaws

The TKIP security protocol (often referred to as WPA) is flawed. The first flaw came to light in November 2008, the second one just last month. But neither flaw is serious.

The first flaw can be defended against simply by disabling Quality of Service (QOS) in your router. Very few people make use of QOS.

The second flaw was described by security expert Steve Gibson as mostly theoretical. For example, it requires that the victim’s computer be out of radio reception range from the router. The bad guy has to connect to the router on one side and the victim on the other side. The bad guy has to be logically and physically positioned between the victim and the router.

Neither flaw lets the bad guy recover the password and they only support decrypting very small data packets. None of these small packets will contain any of your data.

[Read More...]

Protect Yourself on Facebook

Tuesday, October 20, 2009

Love them or hate them; social networking sites are here to stay. And your users are going to find ways to use them from home, from work, from smart phones, from shared computers, or from anywhere else they care to.
The whipped cream is out of the can. Now what can we do about it?

So, how secure are these sites?



I’ve experienced several classic Web security issues in each of the sites I frequent, and without a doubt there remain many vulnerabilities to be discovered. But that hasn’t stopped me from using them.
Like any decision involving risk, I’ve studied the issues, minimized my own exposure, and I’m getting on with what I care to do.

Let’s start by looking at the issues briefly.

Web apps:

Well, for starters, they are Web applications, and as such they’re potentially vulnerable to a plethora of issues, from the OWASP Top-10 and beyond – and yes, there are far more than 10. And don’t think for a moment that all web application vulnerabilities solely place the application at risk. Many also put the app’s users at risk: cross-site scripting (XSS), cross-site request forgery (CSRF), and others can be used to attack the users quite easily.
As a user of a social networking site, you’re placing your (and your employer’s) data at risk.

Active content:

Long-time readers of this column (hi Mom!) have heard me talk about the dangers of active content many times. Javascript, Java applets, Flash, ActiveX, and many others are all examples of active content. And guess what? Every popular social networking site in existence – or at least with a significant population of users – absolutely requires active content in order for the site to function.
The bottom line: by allowing active content into your browser, you are trusting someone else’s code to run on your computer safely. Well, what’s the big deal? We do that all the time. Well, now the code is dynamic and maintained somewhere else, and you’re trusting it every time. Gulp!

Domain of trust:

Some of the HTML, Javascript, etc., that arrives in your browser comes from (say) Facebook. Fair enough, if you’re going to use Facebook, you’ll need to trust that content. But your browser isn’t so discerning. Some of the stuff that comes into it while you’re on Facebook might be provided by someone else: another Facebook user; an attacker; a third party application on Facebook. If your browser trusts Facebook, chances are it’s also going to trust that code. This extends the active content exposure pretty substantially.

User-supplied content:

Users put all sorts of content into their own profiles. URLs pointing to cool sites, photos, etc. If they link to something dangerous—perhaps inadvertently—and you click on it… Well, you get the drift.

Third party applications:

Most of the popular social networking sites have a third-party application interface for companies to generate their own content. Most of it is pretty innocuous and in the spirit of good clean fun, like a little app that lets you “throw” a virtual snowball at someone else. But, again, it extends that trust boundary in ways you might not want.

[Read More...]

Know Fraud and Identity Theft Online

Monday, October 12, 2009

Jakarta - The theft online is one of the crime in a virtual world that uses email, websites, chat rooms or message in your account page.

There are several types of this crime, that is phishing and pharming scams, using email or websites to trick the recipient of a message to terayu to provide personal data such as credit card data, social security numbers, and their important account password.



However, although the movement is growing guerrilla thief, not that hard to avoid it. Learn basic tips to deal with it so we do not fall this cyber world of fraud that mixed Symantec:

What to Do:

* Consider to disable file sharing on your computer.
* Be careful when opening file attachments, especially from unknown senders.
* Familiarize yourself to mamahami privacy policy on the internet, especially if you are asked to provide sensitive data or personal.
* Control the existing provisions in the bank and credit cards regularly.
* Install and regularly update the software firewall, antivirus, and anti-spyware you. We recommend using Norton Internet Security for a more comprehensive protection.
* To maintain the habit of updating the Windows operating system and other applications with the latest patches.
* Strengthen and secure passwords carefully, or consider using password protection software. Norton Internet Security is also able to encrypt passwords to better secure data storage, access to the computer so much to avoid the use of hand nosy. In addition, this software will also notify users if there are sites that offer need to login.
* Lock your mailbox.
* Mash or shredded recap or information obtained from the use of credit card or bank before discharge.
* Check your bank account and your credit card every month.
* Take advantage of free reports on your credit card transactions.
* If you feel you've become victims of identity theft or other cyber crimes, report to the authorities immediately.

What to Avoid:

* Do not provide personal data to anyone via phone or directly (including for purposes of seeking employment, applying for loans, etc.) unless you're absolutely sure that the person or institution can be trusted.
* Do not easily believe it and then reply to incoming email by providing your personal data, including the site obtained from the links, or pop-up ads that suddenly appear on the screen. Better, open a new browser page and type in URLs directly addressed in the address bar to make sure that the site is legitimate.
* Do not store financial data on a laptop unless absolutely necessary. Because portable computers more easily and frequently stolen than a desktop computer.

[Read More...]

Almost So FBI Director Online Fraud Victim

Jakarta - FBI Director Robert Mueller admitted he almost caught online fraud. As a result, Mueller prohibited access internet banking.


Mueller recognition so before the Commonwealth Club in California, United States, as quoted from SMH.co.au, Friday (9/10/2009).

Mueller said the experience showed how dangerous fraud on the internet today. Although she knew about online fraud, he was almost stuck because they do not care.

At that, Mueller said, he got an email that appears to come from the bank where she kept the money. Email it asked Mueller to verify a few things about the bill.

He has started to answer some questions from emails that when starting to suspect something was wrong. Finally he went to change internet banking passwords and deliver it to his wife.

Although not to lose money, because of the incident Mueller's wife was forced to forbid him to do internet banking transactions again.

The FBI on that occasion also says it has arrested 33 people in the U.S. and 47 people in Egypt who are involved in a network of online fraud. This is the result of the combined U.S. operations - Egypt called 'Phry Phish'.

credit: anthneic

[Read More...]
 
 
 
 
Copyright © Digital World
Template Modified by aNtH Blog