Friday, November 21, 2008

WiFi SD !!!

· 0 comments

SDs are part of our digital life , we find them in many devices that uses them to store anything ... songs , photos , data for example ... and almost all laptops come with SD card readers which make our life even more easy ( oww.... exclude SONY ... they don't belong here ) ... all we need is to put card in reader and get all the data ...



But how if we can transfer data without even taking out SD card !!! or more briefly ... without even making any physical connection of hardwares !!! well , i guess it will make our life even more easy .. right ??? well there are technologies that can help us for data transformation , for example blue-tooth or Infra RED ... but each has its own limitations , some like .. lower transfer rate or less mobility ... but a yeasterday i found one site ... Eye-Fi ... who claims to sell , SD card equiped with their own WiFi transmission capability !!!! ... now thats something really amazing that we can transfer our data from SD card via WiFi ... according to them , it is secure too because they store all information about on which network the card should transmit on that card it self ... but still i am a little worried about security , i don't want everybody around my house get my girl's pics .. on their network  :P ...

also the cost is way too high .... the cheapest one is about $ 80 for 2 Gigs ... compared to about $ 10/15 for same size !!! ... but still if you are tech savvy ... may be you can afford that price ...

Njoy ...


Blogged with the Flock Browser

Tuesday, November 11, 2008

Tune up your Windows ...

· 0 comments

Not just another optimizer that we find on internet here and there ... this one is good one ... TuneUp Utilities 2008: The complete Windows optimization package.The Highlights: Boosts system performance by de-fragmenting hard drives; Identifies and deletes non-required files; Deactivates unused Windows functions; Effortlessly solves common computer and display problems; Offers more than 400 options to customize Windows; Analyzes the file system and corrects errors; Performs maintenance functions with a single click.



Temp file management, registry cleaners and start-up program controls are the bread-and-butter of these utilities, and these basics work in TuneUp more quickly and easily than most. However, the app also sports great add-on tools you don't usually see in a utility program. It offers a variety of Internet and program-acceleration tweaks as well as Windows performance enhancers. The crash-preventing MemOptimizer, a file shredder, deleted file recovery, and a respectable uninstall utility round out the suite. You even can automate maintenance tasks with the scheduler or tweak Windows' appearance with the styler tool. The built-in RescueCenter can restore all changes completely or one by one.







Between the guts of steel and the stylish, logically arranged interface, TuneUp Utilities suits all users--from complete beginners who will appreciate the one-click optimization to more daring users who will experiment with all the settings.

Njoy...

Friday, November 7, 2008

Web Browsers .... the new battlefront of hackers !!!

· 0 comments


Attacks on operating systems may be decreasing since last year, but attacks on applications, incidents of malware, and unwanted software are rising and account for 90 percent of vulnerabilities, according to the Microsoft Security Intelligence Report, released Saturday. Microsoft said 30 percent of the malware was Trojan-based, and China accounted for 50 percent of browser based attacks, while the U.S. was second at 23 percent.


The amount of malware and unwanted software removed from computers increased 43 percent in the first half of the year, according to the 150-page report, now in its fifth installment. Thirty percent of that malware was Trojan-based, usually in the form of a computer worm or virus disguised as another application that erases data, corrupts files, and reinstalls itself after being disabled. China had the highest percentage of browser-based attacks at 50 percent, with the United States following with 23 percent. China's infection rate of 6.6 percent, a 41 percent increase from the second half of 2007, was a bit lower than industry experts expected.

Microsoft suggests consumers and businesses check for and apply software updates on a continuing basis, enable firewalls, and install antivirus and anti-spyware programs that add another layer of protection.The software giant also suggests that consumers refrain from opening links and attachments in e-mails and instant messages -- even if they are from a trusted source -- without first considering the harm that opening may cause.

njoy ...



Tuesday, November 4, 2008

Javascript - hacker's favorite language !!!

· 0 comments



Well , like as usual i came across this article ... and it was good to read it ... so i thought to post it here again ....

The demand that the development of web 2.0 has placed on browsers to become more interactive and act as a portal rather than just a viewing platform is opening up new vulnerabilities to unsuspecting users, Itzik Kotler, team leader of the Security Operation Center at Radware, has warned.

As well as developing new signatures and analytic tools for Radware scanning software, Kotler also works on finding new classes of vulnerabilities before they appear in the wild.

One such security hole is in Javascript, which would allow a hacker to copy any file from a user's PC with little chance of detection – something many have considered to be impossible.

Koter demoed the hack, dubbed Jinx, to vnunet.com at this week's RSA security show in London. He showed how the process was done from within the browser itself, not by altering the browser binary, which can be detected by most anti-virus systems, but rather by adding plain HTML code into just one specific file.

According to Koter, this new class of attack will be attractive to cyber-criminals whose existing techniques are increasingly vulnerable to detection because the approach is cross platform and cross browser, allowing the hackers to access systems previously unavailable to them, such as Linux, Mac and mobile.

The problem stems from the fact that internet browsers have quickly moved from being passive text and picture viewers to essentially an operating system in their own right, through interactive services such as user-generated content, hosted applications, web mail and social networks.

"HTML is now like a batch file for everything," said Koter.

"It's only down to shaping and redirecting it from this intended purpose."

He concluded that, although these types of attack are not yet in the wild, security firms and browser developers need to ensure that the increased demand for a more flexible browser does not open the door to hackers.


Njoy

Supporting the Cause

Creative Commons

Translate into your Language

New Day New Giveaway

Powered By Blogger