Google
 

Internet Security, Identity Theft, Recent IT Trend, EV, SSL Digital Certificate Technology

Hi,I am Yuvaraj (Yuvi),From my recent readings I analysed that Internet Security is the need of the hour, so was interested in covering IT, Technology & Security Industry News on my webblog. This Blog would also share and discuss about the imporatance of Secure EV SSL Digital Certificate Technology, VPN and other related online website security measures. If you wish you read my internet marketing blog visit www.hermesmyth.com

My Photo
Name:
Location: Chennai, Tamilnadu, India

Ah! The toughfest question....but to point out a few firstly its my Job and then I am interested in Online Marketing, Internet Security Awareness, Blogging, Computers & Internet and so on.....

Friday, December 26, 2008

Best Top Security Softwares needed to protect your Computer

Being the Computer Technology Generation, Protecting your Computer is like - you being protected with a powerful shield. Quarantining a Virus, intruder, phisher, malware is like killing your enemies. So wonder how much you need to take care of your computer’s health i.e. your health. What security softwares do I need to install in my computer to shield my PC, has been the question running in most of minds who have lot of confidential information as well as consumers who have felt prey to unethical hackers and viruses. Here are some of the important softwares that you need to install in your computer to protect yourself.

Firewall – An Intrusion Prevention System – which protects your computer from unauthorized access / intruders


Anti-virus – Virus Detection, Prevention and Removal Tool, which also protects your from worms, Trojans, Keyloggers and so on.


Anti-Malware – Protects your computer from malicious attacks


Anti-Spam – Protects your mailbox from unwanted or illegal mails


Anti-Spyware – Protects your computer from illegal spy’s which transmits your computer information to third parties


Adware Blocker - Blocks ads that come while you surf the internet


Privacy Control – Safeguards your personal information


Parental Control – You can restrict access for certain illegal, porn websites and care your children by showing them the right website (Right Path)


The above all is available as a Internet Security Suite. Other than this it is also good to have some other software which would function as a weapon and defence border security for your computer.


Back Up – A Storage and data recovery tool, in case you lose your data, it can be restored from the back-up software


Vulnerability Scanning – Its good have a periodic vulnerability scan so that you can assure that you system is completely protected from vulnerabilities


And it’s also good you step carefully while you visit websites which involves financial transaction. So when you attend banking or shopping site, check if the site begins with https:// instead of http:// and also has a golden pad lock (a lock like image) in the browser. If you click the pad lock it will say whether the site you enter is secure. So if the site is secure and fulfils the criteria then you can proceed with your transaction, so that we are alert that we won’t fall prey to the enemies i.e. Phishers.Apart from this there are so many security softwares available in the market, but the above all is considered to be the most important security softwares that will protect and shield your computer from attacks.

Labels: , , , , ,


Wednesday, December 24, 2008

Pirated Versions of Operating System and its security threats



Many of the people worldwide use to download the cracked version of Operating Systems and install and use them at free of cost, without know what are the consequences of using such illegal pirated versions of software’s. Most of the people who want to upgrade a system, they just go online and search if there are any pirated versions of Windows or Pirated version of Linux operating system is available in the web. Though some of the Linux based stuff is available open source, its good they use it. But whereas people now stopped spending to buy the OS and start installing a pirated version, but using fake registration/activation keys.


Is that anyone is aware about what are the consequences they ought to face if they install such kind of fake soft wares. The answer would be “NO”. Let the software manufactures filing a case/suit be on one side, are you aware that you computer is vulnerable for multiple attacks. Whatever latest operating system is being released, it will have some advanced features which will mainly have security features, with automatic updates if the product is purchased. So if a person goes and downloads a pirated version of the software, then they are missing the software developers’ periodic update. The updates are done, while the developers come across some key holes, through which your computer may be vulnerable, in order to close that key hole and save you from such security threats and vulnerabilities , the developers give automatics updates periodically so that your computer is not vulnerable. Without understanding the real fact of purchasing the software, most of the people, they just feel proud downloading a pirated version of software, and even share it with their friends’ network.


Though there are some enterprises which are being sued for using such kind of pirated version of software’s, still individuals, home users and small businesses have pirated version of the software in their system as the person or service providers, just to earn, installs the fake version of the software making a statement – “Let me know if there is any problem, we will fix it” and simply goes off with his payment. But still there are genuine service providers, who priorly purchase the licenses and provide quality services to their customers. So let’s choose the right service provider herein and also meantime let’s spend some dollars to buy the software, and at least try to make good the recession with our minor contribution.

Labels: , , ,


Greetings! Merry Christmas (X-Mas) and a Very Happy New Year 2009 - Yuvi


Make sure you are Safe and Secure during this Festive Season. Wishing you whole heartedly for a Precious New Year.

Labels: , , , , , ,


Wednesday, December 10, 2008

The Top 10 Worst Predictions – On the growth of Technology

In this technology world certain things cannot be predicted. Though predicted it may result adverse. Here is an extract from Indian Express – which itself has extracted from “The Daily Telegraph”. Though my blog mainly deals with internet security and related stuff, In the morning once I opened the news paper, I was really interested to share this with you. Here is the top 10 worst predictions made by experts below.

1. The iPod will never take off – Sir Alan Sugar in 2005.

2. No need for a computer in the home – Ken Olsen, founder of Digital Equipment Corp in 1977.

3. “Nuclear-powered vacuum cleaners will probably be a reality within ten years” - Alex Lewyt, president of the Lewyt Corp Vaccum company.

4. TV won’t last because people would, “soon get tired of staring at a plywood box every night” – Darryl Zanuck in 1946.

5. In 1933, after the First Flight on the Boeing 247, a plane that could hold ten people, a proud being engineer reportedly said , “there will never be a bigger plane built”.

6. “we stand on the threshold of rocket mail” – US postmaster general Arthur Summerfield in 1959.

7. Nobody would ever need more than 640 kb of memory on their personal computer – Bill Gates in 1981, allegedly.

8. “The Americans have need of the telephone, but we do not. We have plenty of messenger boys” – Sir William Preece, Chief Engineer at the post office in 1878.

9. “Spam will be solved” – Bill Gates, 2004.

10. “X-rays will prove to be a hoax” – Lord Kelvin, President of the Royal Society, in 1883.

Source: The Daily Telegraph

Labels: , , , , ,


Friday, December 05, 2008

Virus Removal Tool | Anti Virus and Internet Security Blog Explained

Just wanted to share a blog post written by my colleague about the internet security virus removal tool. Click this link to learn more http://antivirus-internetsecurity.blogspot.com/ about Anti Virus and Internet Security Blog.

Labels: , , ,


Thursday, December 04, 2008

Most Possible Internet Security Threats for 2009

Computer security threats have been increasing along with the technology growth, and high usage of World Wide Web. Though there are Internet Security Software’s including firewall, antivirus, spyware remover, adware blocker, anti-phishing tools or any other computer security products, still there is a risk if the software is not up-to-date. As there is increase in new threats such as viruses, Trojans and worms which infects a PC fast, before the software providers can get a signature to neutralize it. Once the signature is updated, and the software has got an option of automatic updates, then our computer is safe, as the security threat can be neutralized or even quarantined to make the computer safe and secure from further infections. So it has become an utmost importance for the computer user to be aware and secure while surfing the internet.

The other reason why there is increase in the online theft & easy injection of malware into the computer is because of the increased usage of fake pirated version of software in PC system. If a person uses a pirated version of software, then the risk of virus affecting the system is high, due to lack of periodic updates. So it is always to good spend some $10 to buy a real version of software, instead of losing $100 using a pirated version of software. Coming to the predictions for 2009 the Internet security threats and Vulnerabilities may include

Increase in Phishing attacks (Stealing the Identity online) Also see types of phishing.

Increase in Pharming attacks (Hacking done by redirecting the website traffic to a genuine website to a bogus website)

Increase in Instant Messenger Attacks (The online culprits use to send worm or Trojan, which sends automated messages to the people in address book, when the user is online/offline, and when the receiver opens the instant message, and click the link specified in the message, it will again go the recipients present in their address, like a chain)

Increase in Email Spam (Phishers and Hackers try sending out spam – fake messages attached with some virus, spyware, Keyloggers or Trojan trying to make computer users to fall prey them)

Increase in online pop-up ads (Some companies give free software, along with adware, which notifies the company of what the user is typing or searching in the internet, who inturn send pop-up messages, and promotional materials to the computer user which may make him/her disgusting and who need to be ad aware from such adware’s)

Increase in vulnerability attacks (This may be in any of above said forms. Sometimes the Operation system is vulnerable to attacks, if there is no proper protection)

Increase in other such crimes via online internet gaming, pornography etc.

The above said is the possible internet security threats based on the present scenario. In simple, the present threats will increase in future, pertaining to the development in technology.

Labels: , , , , , , , ,