Cloud base application security

November 12, 2011 Add Comment

Cloud base application security



There is a growing business in "Cloud-Based" Anti-Virus and security applications.  (e.g. Panda Cloud)  Are they any good?  


Reviewers mostly say that they are.  However, all the reviews I've read so far are based on the same type of useless methodologies as most "big-name" security applications.  (For more explanation on why these testing standards are useless, see my post:  "What's the best Anti-Virus?")

My quick answer:

At this time, I believe that Cloud-Based Anti-Virus and security applications have significant weaknesses and vulnerabilities.  I definitely would NOT use one now, nor in the immediate future.  

Why: 

One of the main "benefits" touted for Cloud AV's is that the virus signature database is not stored on your PC.  Instead, it's stored on The Cloud, where it is "updated more frequently" than it would be on your PC.  Counterpoints:
The frequency of the signature database updates -- in this kind of situation -- will provide little or no "real world" improvement on the security of your PC.  In fact, it benefits the "Cloud Provider" a lot more than it does you.
For a security application to be effective, it must be able to work faster than the virus itself can work.  If the signature database resides in the cloud, even under optimum conditions, accessing the Cloud signature database will be far slower than if it resided on your PC.  Delays in accessing the signature database can have dangerous repercussions.
It is very normal for access to the Internet to be unreliable and unusually slow.
If you have no access to the Internet, your security is severely impaired or non-existent.  ...Even the publishers of these applications admit this.
Another so-called benefit of Cloud-Based Security is that it requires less "System Resources" than applications installed on your PC.  Counterpoint:
For some older Windows XP systems, this might be useful.  However, any system that is well-maintained and "Vista Compatible"-- or currently running Vista or Windows 7 -- has more than enough computing "horse-power" to provide better security using a security application installed completely on your PC.

Is there any Different between Virus & Malware?

November 08, 2011 Add Comment

Is there any Different between Virus & Malware?



Technically, no. But the difference is mostly Geek Jargon. Here's a brief background to help you understand the differences, and how they affect your choices in security software...

First, there were "Viruses". These programs self-replicated and spread without assistance. They did nasty things ranging from erasing your hard drive, to turning your screen upside down. Then came "Trojans". These programs were secretly installed by non-replicating means, and compromised the security on your computer to allow hackers direct (but hidden) access.

Next came "Spyware" and "Adware". Initially, these programs installed by sneaky-but-legal methods, but quickly devolved into more viral-like, illegal infections. Unlike viruses, these programs are not designed harm your computer. They secretly collect and report information about your browsing and purchasing habits, and/or generate those pop-ups advertisements we all know and hate. However, they DO often slow down your PC, and sometimes damage your system software while installing.

From these basic classifications sprung hundreds of variations and combinations, with two or three jargon terms for each of them. They were grouped into classifications by the burgeoning security software industry, which (of course) made absolutely no attempt to standardize them. A few people (myself included) started promoting the term "malware" as a general term for all MALicious softWARE. But the industry hijacked the term to apply specifically to the Spyware-Adware type of infections.

End result: The differences between "Viruses" and "Malware" are vague an confusing. However, for practical purposes, you can think of the difference primarily as legal. A "Virus" is malicious software that clearly installs itself illegally and/or for illegal purposes. "Malware" is malicious software that installs using sneaky-but-legal methods, and does not perform clearly illegal functions. Another term for this kind of software is PUP ...Potentially Unwanted Programs.

PUPs quickly became such a nuisance that a whole new industry for protection software sprung up around them. Their names usually incorporate the words "spy" or "malware".  Of course, they promoted themselves as an essential element to work alongside Anti-Virus software. However, both Malware and Viruses are detected in basically the same way, and these methods consume a lot of your computer's "horsepower".  Consequently, adding an Anti-Malware program to your computer may significantly reduce it's speed.

Today, most top-line Anti-Virus programs can now detect both Viruses and Malware. Conversely, few Anti-Malware programs also detect Viruses.  Also, the Anti-Malware companies have much less experience with Anti-Virus defense -- which is more difficult than defending against much simpler Malware.

The final difference is that "Anti-Virus" applications only delete the "viral" components of the infection.  They don't "mop-up" the leftover components.  While the leftovers do not pose a large threat for re-infection, most people (including me) are not comfortable leaving them there.

Summary:  Malware-plus-AV products (IMO) do not perform nearly as efficiently as venerable Anti-Virus products that also protect against Malware.  However, anti-malware products can perform better "mop-up" cleaning after an infection occurs, than anti-virus programs do.

On a final note, there are a number of popular, excellent, and free Anti-Malware removal programs. These are often recommended as "security" applications that can be installed alongside any anti-virus Program without impacting performance. This claim is somewhat incorrect. In their free versions these programs do not BLOCK Malware.  ...They will only REMOVE Malware AFTER it is already installed on the computer. Only the paid versions of these programs will BLOCK Malware.  Some of these programs DO include small, passive features that assist in blocking malware, but they do not actively scan files for malicious code the way that an Anti-Virus does.

Blackberry vs iPad 2

November 07, 2011 Add Comment

Blackberry vs iPad 2


Electronic accessories accept become an basic allotment of technology. These accessories accept as well been actual important to the circadian lives of abounding people. Things such as computers, phones, and iPods accept become a part of the a lot of avant-garde articles on the bazaar in contempo years. One of the newest electronics articles has been the tablet. The book is a carriageable accessory that acts like a PC. It allows you to cream the  internet, watch videos, and forward emails. Two of the a lot of accepted and accomplished superior tablets accessible are the Blackberry Playbook and the iPad 2. These accessories are a part of the best tablets on the bazaar and acquiesce users to accomplish abounding functions. Like all added articles they anniversary accept their own advantages and appearance that accomplish them distinct.

As far as the Blackberry playbook goes there are abounding absolute attributes of this product. First the book has a 7" LCD affectation awning which provides top superior clarity. This makes it simple for humans to get a bright appearance of what they are aggravating to see. The Playbooks as well has a 1024 x 600 awning resolutions, 1 GHz bifold bulk processor and a RAM of 1 GB. This book aswell runs Flash so humans can use watch videos whenever they want. A Playbook book aswell works with Android applications. As a aftereffect you can accept up to 200,000 Android toys accessible for use. One of the things about the Playbook book is that it doesn't accord you abundant admission to email so you will not be able to accessible emails unless you accept a smartphone affiliated to it.

The iPad 2 is addition superior artefact that contains abounding audible appearance that accomplish it actual ambrosial to consumers. First, the accessory has a 9.7" LED screen. It aswell has a resolution of 1024 x 768 at 132ppi forth with an Apple 1GHz A5 processor and a RAM of 512 MB. The looks of the accessory are actual acceptable as it has an accomplished architecture that is actual attractive. An iPad 2 works with abounding added applications than the Blackberry and accordingly offers added options. However the iPad 2 doesn't run Flash so you will not be able to watch videos on this device.

Both of these articles are actual acceptable and action consumers a top of the band cyberbanking device. These tablets are actual acceptable and acquiesce users to admission abounding adorable features. If you are anyone who is searching to use a book for examination videos again you are bigger off with the Blackberry playbook. For anyone who wants the a lot of bulk of appearance and apps should aces the iPad 2 as it is your bigger option. Despite their differences these two tablets are a abundant best for abounding consumers and should abide a part of the top rated electronics articles on the market. If you are searching to get a book that offers abounding appearance and allowances for a array of occasions again these two are accomplished options.

Tablets, iPads Able to Replace Personal Computers?

September 10, 2011 Add Comment

Tablets, iPads Able to Replace Personal Computers?




Perhaps you've heard the fireworks and acclaim for iPads, along with the claims that they will quickly replace Personal Computers.  Is this true?


The answer is a little difficult, because all "Tablet" systems -- including the iPad -- are Personal Computers.  They all have the same basic components.  Only the shape is different -- and they run a different type of Operating System.  But Tablets are just as much a PC as your current Laptop or Desktop PC.

Your PC Tech's Short Answer:  No, they will not completely replace Laptop and Desktop computers. However, tablets will be a major part of future computing.  They have significant advantages for light, basic computing needs, but cannot completely replace Laptops and Desktops for "heavy-duty" applications.  (...For the near-future.)

Your PC Tech's Prediction:  Roughly half of all current PC users will buy tablet PCs within the next three years.  Roughly half of those will eventually give up their laptop or desktop PCs, and only use their Tablet PC.  The other half will continue to use both a Tablet PC and a Desktop or Laptop PC.

In addition to this, a large number of people who have never owned a PC at all  (because they were "too complicated") will buy a Tablet PC, and be very happy with it.

Summary:  Tablets may eventually dominate the market.  But for the near future, the physical, technical, and software limitations of Tablets will prevent them from completely replacing Laptop and Desktop PCs.

How to make your website / blog #1 on google search

August 06, 2011 Add Comment
No doubt, a website or blog that ranks the top on search results in google search engine , has a greater chance to be visited by internet users. They tend to be more interested in visiting a website or blog that is perched and emblazoned his name on the home page google . This is because it is considered more relevant to the keywords they are looking for, as well as of course because of its practical and easy aspects. Rarely there are internet users who want to search up to the next pages of search results google search engine .

In short, crowded traffic and high pagerank your website or blog is the key to success in winning internet business competition. This is the main requirement if you want to be popular and your website or blog sells and get many jobs from advertisers , merchants and online vendors . So, the only way to master the internet market is to increase traffic , increase pagerank , multiply backlinks and promote your website or blog widest-width indefinitely in cyberspace.

The question is, how to make our website or blog is on the first page of search results google search engine ? Actually, there are many ways and strategies that can be applied to increase traffic and increase pagerank google website / blog us.

The first way is to implement a search engine optimization strategy or better known as SEO , the abbreviation of search engine optimation. There are 8 basic points and important elements that you should pay attention to support SEO , namely Domain Name, Title or Head, Meta Keyword, Meta Description, contents / content, Sitemap, Natural listing, and last Backilnk.

SEO techniques are divided into two, namely OnPage and OffPage. OnPage SEO is a technique that is done or applied by arranging from within the website / blog, such as maximizing keywords and descriptions to be more easily recognizable and read by google search engine . While OffPage SEO is utilizing space outside the blog. This can be done for example by including the name of the blog or blog address on another website ( natural listing ) or share a banner or link with another blog. This is the most effective way to boost blog popularity

Based on the above techniques, then in OnPage SEO , between domain era, blog name, post title, keyword-rich key used in posting ( content ) to meta keywords and meta description must be strongly related to each other. That is, it should use the same and consistent words, so the search engines easily recognize it. To help seOnPage SEO, take advantage of http://www.google.com/analytics/ . Register your blog now. This is useful for monitoring daily traffic, weekly or monthly traffic. Also take advantage of http://www.google.com/webmasters/tools . Webmaster tool useful to summarize the entire contents of our blog, so easy to read google. As for OffPage SEO , you are required to actively spread your website / blog address to many search engines, webdirectory or article directory. Also you must actively exchange banners or exchange links, and exchange traffic or exchange visits with other bloggers.

To register your blog into search engine try to http://www.searcengineoptimising.com . More sites http://www.sumitexpress.com . With sites like that you can register your blog to various search engines, not just google and yahoo. Register also your blog to blog directory or article directory for your post. Thus, your posts and blogs will become more known. There are hundreds of sites like this. Try search on google with key word add url, blog directory and such. Then register your blog there. One example is http://www.pingoat.com . Submit your blog here to send to various search engines.

While on OffPage SEO , what is required is to include or put the identity, your blog address in different places as much as possible, like in various search engines other than, on the web / blog ditectory, article directory. and. In this way, the various search engines will easily find your web / blog. In addition, is bakclink the name of your website / blog address that is on the web / blog of others. How many blaclinks counts shows the level of popularity of your blog.

Beyond SEO, there are many other ways that can be done to put your blog on the top page of google search. One of them is black SEO. This method is called black, because it is not visible, aka cat-kucingan and spelled practically sly. Do not apply blak SEOini padablog that you register on google Ansense.

Another way that you can still do is to exchange links and exchange traffic. Both of these ways very quickly raise your blog pagerank. How to exchange links and traffic can be done manually or automatically. To exchange links, try registering your blog to www website, linkmarket.net . You can exchange your blog links there with hundreds or even thousands of other blogs. To exchange traffic, likewise, there are manuals, some are automatic. Try to http://zuminsurf.com . Sign up there and exchange your traffic as much as possible with other users or blog owners.

Give your website / blog a little touch and a simple idea of ​​it for amazing results. Follow the step by step, and make your website / blog into number one in google.

Google Algorithms: Panda Updates

June 29, 2011 Add Comment

Google Algorithms: Panda Updates


Not to be confused with Panda the animal the update refers to the man behind recent algorithmic changes. The update is named after Navneet Panda the chief architect of recent changes.  This way best SEO practices have been further strengthened. 

As I have been always saying the impetus on SERPs lies on quality site building. This does not mean standard optimization practices have been done away with. The paradigm has changed, it is good quality site first. A website for users and not overtly manipulated for search engines.       

Look deeper into the site especially the design part like download speed, user friendliness, contents etc. Scraper sites or those made for Ads were completely wiped out leaving few that offer good information. Those who relied on content picked up from other sites by intent and habit have suffered the most. The sites have been pushed down deep or eliminated from the SERPs.  The Panda update has pushed the seo professional more towards understanding web design and contents though he may not be a designer. 

Dig deeper in the analytic in order to discover how visitors treat your site. Do they find information they are seeking and easily? This depends upon content creation and link architecture and your analytic will display the time spent on your website. This is called the bounce rate and it tells the search engines how much time has been spent on site - the more the merrier.   

Pidgin Chatting: New era

June 28, 2011 Add Comment

Pidgin Chatting: New era


Chat applications on Linux systems have just released the latest version, which is Pidgin 2.8.0. Upgrading carried out by prioritizing voice functionality with a plug-in for the feature "settings" are available. Another improvement is the cleanup code duplication, repair some of the protocols on the ICQ, IRC, MSN, and AIM applications. Pidgin 2.8.0 implement a method that allows voice calls more clearly, it is intended that the bandwidth used is not compromised.


This chat application will provide a separate distinction for those who've tried some Instant Messenger applications before, especially in the Window operating system. Indeed there are some differences that exist in every feature, but I think it's not worth the trouble. Some of the key features that are almost entirely suitable for other applications, so it will give a distinct impression at the time of your chat activity, primarily because of the extra features like "voice" that you can use settings.

Backlink from wikipedia

June 09, 2011 Add Comment

Backlink from wikipedia



Link building is one of the most important parts of their search process optimization engine package. SEO companies involved in this profession using different tools and techniques like directory submission, article submission, press release submission, forum posts and yahoo answer to improve your ranking in search engines. In recent years, Wikipedia has become one of the most effective and powerful tools to build back links to your website. 

In this article we have come up with some basic facts about using Wikipedia as a tool for building links and generating more traffic to your website. Opportunities to create links in the Wikipedia is in the fact that Wikipedia allows users to upload any type of information content and the information they want. The content is open to be edited by any user who wants to provide the most relevant and current. This is the opportunity that is used by web site owners and link builders to advertise their website. 

However, it allows a business to advertise on Wikipedia? 

As a matter of fact any type of gross advertising published in the wiki page is removed when it is detected. This is because the site is aimed at providing adequate and relevant information to users. However, if it is used and implemented wisely, can be used as an advertising platform. 

To establish links and market your website in Wikipedia webmasters to create a content that is closely related to your niche website and very informative and attractive to users. Webmasters can offer your web links to support the content. However, webmasters should provide the link as a resource from which users can read more about the subject is explained there. For example, if you are in the field of "error trapping" and then try to create a wiki page on "top 10 mistakes capture strategies in hotels" and include your website or blog as a reference site where users can know a lot about bug catching practices and services. 
Since then, the link which is relevant in the context of its subject, is seen as an attempt to advertising and links are likely to remain there. 

Advantages of link building to Wikipedia 



Links from a reputable website like Wikipedia and authority can certainly increase your link building effort and contributes a lot in their overall marketing strategy. 

Disadvantages of building links to Wikipedia, however, negative thing about using this marketing strategy is that with each edition of your IP address is visible to Internet viewers and therefore their competence can be used to pay your marketing efforts. Second, their content is open for editing and changing so if you are not willing to get their content changed or edited, is not the right platform for you to go on. articlebase

Comcast XFINITY TV App For Android

June 09, 2011 Add Comment

Comcast XFINITY TV App For Android


Comcast has officially released its XFINITY TV app for Android which allows users to browse current television listings and watch on-demand content. With XFINITY TV app, users able to watch favorite On Demand shows and movies right on Android devices for on-the-go entertainment. Xfinity TV app for Android comes with features such as ability to remote control cable boxes, record TV shows, schedule DVR recordings, search the VOD library, change channels, tune directly to on-demand programs in the catalog, and tuning to VOD on the TV.



Features of XFINITY TV app for Android:


  • Browse TV listings customized in your area.
  • Browse an On Demand library featuring thousands of titles.
  • Search TV listings and On Demand for any show or movie.
  • Filter content by genre, network, HD, free and much more.
  • Control your TV and DVR.
  • Conveniently change channels right from the app.
  • Tune directly to On Demand programs to watch on your TV.
  • Schedule DVR recordings of your favorite shows, series, and movies.

XFINITY TV app for Android is completely free and available in the Android Market, but does require a Comcast subscription to use. Users need compatible set-top box or DVR from Comcast that can accept commands from the app. Once installed XFINITY TV app on device and connected to Comcast account, users can control cable box or DVR in anywhere through the device.

Disable: In-App Purchase on iPhone + iPad + iPod touch

June 08, 2011 1 Comment

Disable: In-App Purchase on iPhone + iPad + iPod touch



Most Apple iOS device users have credit card or PayPal billing information set up nicely in iTunes Store account to purchase music, apps, books, TV shows, movies, podcasts and etc. The billing information pre-defined inside the iTunes account also can be used directly when buying something from within the apps, in a feature called in-app purchase.

In-app purchase has been one of the increasingly popular revenue-generating avenue for app developers. More and more apps require in-app purchase to, for example, remove ads, get more functionality, reveal additional content, while games use in-app purchase to unlock levels, possess advanced weapons, upgrade characters, gain strength and etc.

Most in-app purchase can be done easily, as simple as a few taps away. And the “shortcut” allows iOS device such as iPhone, iPad and iPod touch owners especially minors to easily rack up the iTunes bill, knowingly or unknowingly. Kids may purchase in-app without consent of parents or guardians too.

Instead of removing the credit card, debit card or PayPal billing information from the account, Apple provides a way for disable the in-app purchase. Once the in-app purchase function is turned off, nobody who use the mobile iDevice will be able to purchase by using the billing information on your iTunes account from within the app. And the “lock” on in-app purchase is protected by a PIN code. In other words, you want to in-app purchase, you unlock and enable the function by entering the PIN code, otherwise it’s impossible to purchase in-app.

Here’s how to disable in-app purchase on iPhone, iPad and iPod touch:


  1. Tap the Settings app.
  2. Go to General.
  3. Go to Restrictions.
  4. Picture:01
  5. Tap on Enable Restrictions (if it’s not enabled yet).
  6. Picture:2
  7. If you just enable restrictions, you will be asked to set up a Restrictions passcode. The passcode is required to unlock the restricted features or disable the restrictions. Enter a 4-digit passcode of your choice.
  8. Pictures: 03 & 04


  9. Swipe to scroll down to “Allowed Content” section, and slide the In-App Purchases to Off to disable in-app purchase.
  10. Picture 05 & 06



Once restriction for in-app purchase is in place, you will need the pass code to re-enable the in-app purchase, and no in-app purchase can be done without the passcode.