Wednesday, 17 April 2013

Problems And Solutions: Norton Internet Security


The internet is fraught with lot of malicious code. Even a casual internet surfer can very easily lose an expensive hard drive of his unprotected computer. Norton Internet Security software which is made by Symantec Corporation is among the most popular security programs, it defends your computer from any host of internet dangers. However, every program has its own good points and bad points, even with the best program that you trust most for keeping your computer safe. Norton Internet Security comes with a secure firewall but there are some problems that you should watch out for. In this article you will get to know about some common problem that you face with Norton Firewall.

Mac Security Update

Norton's firewall with the Internet Security 3.0 has caused little problems with a specific update to Mac OS X in 2003. When the July 14, 2003, update was actually applied, some computers could not reboot, and thus the only way to salvage all those computers was to boot it from any other another device, such as the other operating system installation disc. Users with old versions of this software should be little cautious while updating their computer system.

Sunday, 14 April 2013

Norton Antivirus: The Major in Antivirus Industry



Selecting an antivirus program, such as Norton, isn't a process that you should take gently for your PC. Trojan malware, malware, and innovative malware technology designed by online hackers and criminals are regularly trying to get onto and take over your program. In this feeling, the internet can be a terrifying place as you never know what type of malware will be launched next. Norton is an antivirus program that not only works with the newest Ms operating-system, such as both 32- and 64-bit editions of Microsoft windows 7 and Microsoft windows vista, but also has many features that every PC should use for security. When we talk about antivirus support, Norton comes to the rescue in the best manner possible.

Basically, Norton is able to protect your software applications and prevent Trojan malware, and virus, three key items of malware that essentially all antivirus programs prevent. Norton also prevents malware, crawlers, and even rootkits, which are basically brilliant items of malware that covers from you the fact that your PC has been affected. Not all antivirus programs prevent rootkits, which is why Norton is different and more innovative.

Friday, 12 April 2013

Tips for Recover Files Deleted by McAfee


The article intends to describe how the files deleted by McAfee antivirus can be recovered. The methods described here is simple and correct until date. It is still advised that users follow the instructions accurately to avoid running into problems. This will also save them from spending time and money looking for McAfee product support.
Besides protecting your computer from nasty viruses, spyware etc., McAfee may remove important data files from it in its virus removal endeavor. If you have already experienced this, then you seriously need help to recover those deleted files. The below mentioned tips will help you perform the recovery on your own. This essentially means that you needn't contact your McAfee technical support for help.
Instructions:
  • Since it is not possible to recover the deleted files manually, you would need to download and run a data recovery tool. You can choose from a wide range of available free or paid tools including DERESCUE data recovery master, Recuva, AusLogics BoostSpeed, Undelete Plus, Recover Deleted Files, and Drive Rescue.

  • Once you have concluded on any of the abovementioned tools, download it from a trusted website. When prompted, save the file to a location in computer where it can be easily accessed from. When the file is saved, locate it and run to initiate the installation procedure. You may need admin rights to run the file. It is recommended to save the file on desktop for convenience.

Thursday, 11 April 2013

Things Every Computer Geek Should Know


The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you’re that type of person and are looking for a few extra skills to pick up, or if you’re a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know.

How to become a real computer Geek?

Little known to most, there are many benefits to being a computer geek. In our high-tech society, being a computer guru can be one of the most high paying jobs available and they are highly in demand, especially if you want to become a network administrator. By tapping into your inner geek, you can develop a most useful skill that will be sure to pay off later in life.
You may get the answer here: http://www.aagneyam.com/blog/?p=1059

The Meaning of Technical Acronyms

  • USB – Universal Serial Bus
  • GPU – Graphics Processing Unit
  • CPU – Central Processing Unit
  • ATA- AT Attachment (AT Attachment Packet Interface (ATAPI)
  • SATA – Serial ATA
  • HTML – Hyper-text Markup Language
  • HTTP – Hypertext Transfer Protocol
  • FTP – File Transfer Protocol
  • P2P -  peer to peer

1. Default Password List

One of the best list of default passwords. http://www.searchlores.org/defpasslist1.htm 1A. Usability of passwords http://www.baekdal.com/tips/password-security-usability

2. A bit, about How to hack some common gadgets.

If you rolled your eyes here, that is a good thing. If not, you have many things to learn, young padawan. It’s amazing how few people know how to do this. If you’re unsure, hit up the link below to find out how: http://www.aagneyam.com/blog/?cat=708

3. Identify Keyloggers

Internet cafes are the most likely place you’ll find them, followed by library, perhaps, and maybe even you own house if you’ve some unscrupulous friends/family. Identity theft groups warn about keyloggers and advocate checking out the keyboard yourself before continuing. Can you identify a keylogger, however, if one is plugged into the back of the system? Here’s what one looks like: Hit up this link for excellent info on keyloggers on public computers and how to protect yourself: , http://www.ghacks.net/2007/06/28/how-to-defeat-most-keyloggers-on-public-computers/

4. Surf the Web Anonymously

We won’t make any assumptions about why you may need this particular skill, but the fact remains that every geek should know how to traverse the Internet with the highest amount of security possible. Aside from the safest method–which is using a connection that is not yours–you will need the ultimate in proxies…Tor. Tor is an onion-routing system which makes it ‘impossible’ for someone to find out who you actually are.

5. Bypass a Computer Password on All Major Operating Systems

Obviously you shouldn’t use this to gain unlawful access to a computer. If you’re a geek, however, you’ll eventually end up in a situation where someone forgets their password, you acquire a machine with an operating system you cannot access, or similar situation. See this tutorial for info on how to bypass the password on the three major operating systems: Windows, Mac, and Linux. http://www.joetech.com/2009/01/29/how-to-crack-the-account-password-on-any-operating-system/

6. Find a Users IP Address on AIM

Knowing someones IP address is actually pretty useless in this case, but most people don’t realize that. If someone is harassing you via AIM and you can’t get them to stop, discovering their IP and sending it to them–with a nicely worded threat of law enforcement involvement should they not stop–is likely enough to send them scamping away with tail between legs. http://www.ehow.com/how_5529416_someones-ip-address-aim-chat.html

7. Hide a File Behind a JPEG

So you need a nice spot to hide your blackmail personal files. You could, of course, bury them deeply within a series of random, useless folders, but there’s always the chance of them being discovered. A password protected RAR is the best choice, but it’s a bit obvious despite the most boring title you could give it. A sneaky person would hide the important file behind a completely random and boring family reunion photo, where no person in their right mind would shift through. http://www.online-tech-tips.com/computer-tips/hide-file-in-picture/

Read more: http://www.aagneyam.com/blog/?p=466

Monday, 8 April 2013

Install McAfee Antivirus from CD


McAfee antivirus offers users a worry-free solution for their security needs whether browsing, email, and website protection besides blocking online threats like viruses, Trojans, worms, and other malware infections. There are two ways to install McAfee antivirus software on your computer. One is from the software CD that we have described here and other is from the internet.

Before we begin with the installation procedure, we hereby assume that you already have a McAfee antivirus CD handy. If you don't have one, you can call McAfee product support to ship you one. You can also go to a McAfee-authorized computer center to get the installation disk. Keep the McAfee antivirus software manual or documentation handy as it would have the product key printed on it somewhere.

Besides, if you are installing McAfee for the first time on your computer, do a few more things to make sure that McAfee installs properly. If you previously had other antivirus software installed, remove it completely from your computer before installing the McAfee software. Two antivirus programs always have a tendency to conflict with each other, resulting in common and frequent malfunctioning of either one besides showing error messages. Insert the McAfee setup disk into the CD drive of your computer. Wait for the automatic prompt. The McAfee Security Setup window will come up.