Home About Contact

I made this widget at MyFlashFetish.com.

Jul 24, 2009

COMODO Internet Security 3.9.81003.508  

COMODO Internet Security 3.9.81003.508 is a Antivirus Software product from comodo.com, get 5 Stars SoftSea Rating, COMODO Internet Security is the product which we have intgrated COMODO Antivirus, COMODO Firewall and COMODO Defense+ in a seamless manner. We have also fixed many bugs in COMODO Firewall with this release.
The COMODO Internet Security was designed to be the that integrates COMODO Antivirus, COMODO Firewall and COMODO Defense+ in a seamless manner. We have also fixed many bugs in COMODO Firewall with this release.
COMODO Firewall or COMODO Antivirus canbe installed as standalone products by using the same setup.
Developed by one of the world's leading IT security providers, Comodo AntiVirus leverages multiple technologies (including on demand & on access scanning, email scanning, process monitoring and worm blocking) to immediately start cleaning or quarantining suspicious files from your hard drives, shared disks, emails, downloads and system memory.
Comodo Firewall Pro offers 360 protection against internal and external threats by combining an enterprise class packet filtering firewall with an advanced host intrusion prevention system. The new-look interface facilitates quick and easy access to all major settings, including the strong and highly configurable security rules interface.
Built from the ground upwards with your security in mind, this award winning firewall constantly monitors and defends your system from inbound and outbound attacks. Version 3.0 now features a fully fledged Host Intrusion Prevention System called Defense+ to protect your critical operating system files and block viruses and malware before they ever get the chance to install. In fact, Defense+ is so good at blocking malware, you may never need a dedicated anti-virus software ever again.
The new-look firewall features a friendly graphical user interface; highly granular configuration options; easily understood and informative alerts; wizard-based detection of trusted zones and much more. It delivers enterprise class protection yet can be used 'out of the box' - so even the most inexperienced users will not have to deal with complex configuration issues after installation. The license of this antivirus & security software is Free Trial Software, you can free download and get a free trial before you buy. If you want to get a full or nolimited version of COMODO Internet Security, you can buy this antivirus & security software.

Jul 22, 2009

Network Simulator (GNS3)  

GNS3 is a Graphical Network Simulator that allows emulation of
complex networks. You may be familiar with VMWare or Virtual PC
that are used to emulate various operating systems in a virtual
environment. These programs allow you to run operating systems
such as Windows XP Professional or Ubuntu Linux in a virtual
environment on your computer. GNS3 allows the same type of
emulation using Cisco Internetwork Operating Systems. It allows you
to run a Cisco IOS in a virtual environment on your computer. GNS3 is
a graphical front end to a product called Dynagen. Dynamips is the
core program that allows IOS emulation. Dynagen runs on top of Dynamips to create a more user friendly,
text-based environment. A user may create network topologies using simple Windows ini-type files with
Dynagen running on top of Dynamips.

Jul 15, 2009

Bing vs Google  

Nampaknya, google mungkin akan ada pesaing baru bernama Bing.. Bing adalah product baru dari microsoft yg akan dilancarkan 3 Jun ni.. Tak berani nak komen banyak2 psal product microsoft ni, kang bahaye.. tp ikut rekod lame, Blue Screen of Death (BSOD), Red Ring of Death (RROD), adakah akan wujud juga istilah baru dalam produk ni? kite tunggu dan lihat..hehe

Berbanding google yg menggunakan "advertising-based search model" yg mane menghasilkan item yg paling popular mengikut query, Bing ni menggunakan ‘decision engine’ yg katenye bukan maen ikut popular je, die akan serahkan kat user untuk buat keputusan.. camtulah bunyinye..

“We are introducing a new level of organisation to search results, and our differentiator will be the best results for query,” Satya Nadella, senior vice- president (R&D , online services division) Microsoft.

Menurut diorg, sebagai contoh.. kalau kite search British Airways, Bing akan kuarkan nombor talipon service centre, harga tiket dan maklumat2 lain (walaupun kite just nak cari wikipedia..)

die kate.. “Google is great, but I think you still have to run multiple search queries to get that right answer. If Bing can change that, I will surely shift my search engine,”

Jul 11, 2009

conficker  

July 10th, 2009

Conficker still dominating attack landscape

The Conficker botnet was by far the largest source of online attacks on the web in the first quarter of 2009, according to web services provider Akamai.

The company's quarterly State of the Internet report found that in the first months of the year, Conficker accounted for some two-thirds of all attack traffic.

First appearing in late 2008, Conficker spread throughout the web in 2009. By March, the worm touched off a media firestorm when researchers noted that many of the infected machines were programmed to dial an instruction server on 1 April.

Though no major attack occurred, the incident earned Conficker a fair amount of notoriety among IT professionals and home computer users alike.

Of the attacks that did occur in the first quarter of the year, most were from China and the US. According to Akamai, roughly half of all internet attacks originated from one of the two countries.

Akamai also revealed its findings on broadband speeds. Much like an earlier report from analyst firm Futuresource, the company placed Japan and South Korea as the countries with the fastest broadband speed.

The company also pegged Sweden as having the fastest broadband speeds in Europe, followed by the Netherlands and Romania.


Source: V3.co.uk

Oct 19, 2008

WHAT IS COMPUTER SECURITY??  

Computer security is a branch of technology known as information security as applied to computers. The objective of computer security varies and can include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy.
Computer security imposes requirements on computers that are different from most system requirements because they often take the form of constraints on what computers are not supposed to do. This makes computer security particularly challenging because it is hard enough just to make computer programs do everything they are designed to do correctly. Furthermore, negative requirements are deceptively complicated to satisfy and require exhaustive testing to verify, which is impractical for most computer programs. Computer security provides a technical strategy to convert negative requirements to positive enforceable rules. For this reason, computer security is often more technical and mathematical than some computer science fields.[citation needed]
Typical approaches to improving computer security (in approximate order of strength) can include the following:
Physically limit access to computers to only those who will not compromise security. Hardware mechanisms that impose rules on computer programs, thus avoiding depending on computer programs for computer security. Operating system mechanisms that impose rules on programs to avoid trusting computer programs. Programming strategies to make computer programs dependable and resist subversion.

Sep 19, 2008

Hacking Expose : Web Applications  

The Bottom Line

The malicious hackers of the world know lots of tricks and techniques for identifying the weaknesses in your web servers and exploiting them. If they didn't, they will after reading this book. All web administrators and developers should read this book. It provides broad and detailed coverage of the vulnerabilities inherent in various web applications from IIS to Apache and everything in between. More importantly, it explains how to guard against such attacks.


DOWNLOAD







Book Description:

The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications. - This is the only official review guide to the test, covering all CEH exam objectives, from ethics and testing to securing wired and wireless networks. - Written industry expert Kimberly Graves, this concise, focused guide is ideal for people who have taken CEH classes and need last minutes review.



DOWNLOAD