Saturday 28 February 2009

Top 10 Reasons Why You Should Use Firefox Over Explorer

If you are someone who operates an online business, conducts research using the Internet, utilizes email, or simply reads about current affairs online and you do any of this using the Internet Explorer browser from Microsoft -- you are not only corrupting your computer, but you are missing out on several major features.

Here are 10 Reasons Why You Should Be Using the Firefox Browser over Explorer:

1. Faster Browsing
Have you ever felt compelled to knock your monitor off your desk, due in large part to the time it takes to load the Internet Explorer browser? Firefox has a powerful cache system that stores sites that you visit frequently, so that the next time you want to see that site again, it loads faster in Firefox.

2. Plugin Support
One of the best features, especially for Internet marketers, is the plugin support for Firefox. You can download an install plugins right from your browser and customize it to fit your needs. One of the best plugins for marketers is the SEO plugin for Firefox.

3. Security
This should be #1 overall, since security is a major concern online - but how good is security if you can't browse fast enough to even think about it. Firefox will warn a user when a risk is evident and will even stop you from visiting known hacker, spyware and virus sites -- so your computer stays healthier, longer.

4. Download Manager
Firefox allows you to control your download files in one pop up interface. You can pause a download, remove a download, come back and download the file at a later time. And you you notified of the size and location of the download when it is complete. Since Firefox is half the size of the massive Internet Explorer, download times are cut in half.

5. Page Info
No matter what page you are viewing in Firefox, you can always "right-click' anywhere and the Page Info box will open up, which provides the viewers general information, media that can be found on the page, permissions and page security (in a tabbed format).

6. Blocking Images
You've undoubtedly viewed a site in the past that was full of pictures, advertisements or images that really distracted you from obtaining the result you were looking for. In Firefox, you can disable all images by simply "right-clicking" on an image and select the option to block all images on that page.

7. Open Source
Firefox is an open-source project by Mozilla. This is an advantage because literally thousands of independent programmers can work on building Firefox and troubleshoot and repair any foreseen security issues the browser may experience, before they even happen.

8. Password Manager
Firefox has a password manager built into the browser so that you may easily store usernames, email addresses and passwords for your favorite sites. If you ever forget what your username or password is, Firefox allows you to easily access the information in their security tab. You can also delete one, or remove all passwords with one click of a button.

9. Restore Previous Session
Has your browser ever crashed at the wrong possible time and you had to go back and try to redo what just got undone? Firefox comes with the 'Restore Session' feature, so even if your browser abruptly shuts down, when you enable Firefox again, you will be given a choice to restore previous session, or start a new session.

10. It's Not Microsoft!
How many times over the years have you heard, or heard of Internet Explorer warning of 'security threats'? And how many times did you hear about Firefox on the evening news during the same period? Exactly.

Hands down, I recommend everyone who is currently using the Explorer browser to switch to Mozillas Firefox browser. It's safer, it's faster and comes with many more usable features that don't clutter our tool bars.

About the Author

Steven M. Lewis is an Internet Success Planner & Online Business Developer. Learn proven Internet marketing tips that will help you build and grow a profitable online business. For marketing tips you need to know, visit: http://www.stevensmarketingtips.com

Article Directory: http://www.articlerich.com

Thursday 26 February 2009

Identity Theft Using Second Hand Hard Drives

For most people these days technology is almost a throwaway fact of life; for some however old or no longer necessary technology provides a welcome source of additional income.

There can be no better illustration of this than EBay, the auction website. However there are inherent risks that can lead to problems which can only be solved by the use of expert Computer Forensics techniques.

It is important to understand that simply deleting information from a computer hard drive does not necessarily get rid of it; deleting it simply frees up the space so it can be overwritten with new data.

And just as Computer Forensics Experts can retrieve this data should the need arise so too can the well informed and increasingly sophisticated computer criminal.

One of the most common problems found by Computer Forensics personnel is the problem of hard drives not being properly formatted and wiped clean of all or any previous data. Without proper handling these hard drives, often sold on auction websites for a fraction of their original cost, can be reconstituted thus giving rise to identity theft and thus needing the help of an expert in the fight against Computer Crime.

It is of course not just individuals who sell their equipment on auction websites; companies also sell their unwanted equipment in the hope of making some extra money and without considering the consequences of not ensuring their hard drives are properly cleaned.

The home user wishing to make some extra money, or indeed the business user looking to recoup some money spent on newer equipment, can use disc wiping or erasing utilities which can be purchased from reputable Internet sites or from high street retailers but unfortunately many do not engage in this practice and as a result in recent years thousands of private citizen's details including their dates of birth, PIN (Personal Identification Numbers) and other personal details have been recovered on supposedly clean hard drives.

Computer Forensics Experts are often called upon to help recall lost data and also to prove that data has existed on a particular hard drive at some time.

Unless the hard drive has been removed physically from the computer and replaced with a new one, or the disc has been subject to an erasing utility, the likelihood is the information will be retrievable.

If you are a business and have a large number of computers to dispose of it is wise to take advice from an expert who will be able to help ensure that all personal and sensitive data is removed and non-retrievable before you part company with your computer equipment.

About the Author

Andrew Frowen is Managing Director of IntaForensics and a registered Computer Forensic Expert. Visit Computer Forensics for further information.

Article Directory: http://www.articlerich.com

Tuesday 24 February 2009

Cleaning Windows XP: Getting Started

You can do quite a bit to clean the average Windows XP system. Files proliferate, programs fall out of favor, viruses reproduce, e-mail clusters, and pop-ups populate. Throw in a little system neglect and before you know it, you have a messed-up system that badly needs cleaning.

Cleaning a Windows system is more about behavior than it is about one or two tasks. Granted, you need to do some remedial work to get your system back in peak condition, but once you do, keeping your system clean on an ongoing basis is much easier than doing the remedial work in the first place.

Essential tasks

In general, you should work on the most accessible parts of the system first and then move on to the rest. Following is a list of essential tasks to do even if you're really pressed for time.

If you have only limited time available, get rid of unused and unneeded files. Archive your old-but-still-valuable files to get them off your system. When you have more time, you can go back and deal with your programs and your system as a whole. (Generally you should get your programs under control before worrying about your data, but the key here is time restriction. Working on programs simply takes longer than does taming your data.)

If you have more time available, do a program inventory and remove the programs you no longer need. You'd be amazed at how much clutter this can remove from your system. Then go back and clean up your data and archive your older information.

Get rid of spyware and spam and get your Internet environment under control. If you do this, you find that using the Internet can again become productive, rather than frustrating.

Closely examine what your computer loads without your knowledge. This is one of the key places many people overlook (even when suggesting ways to clean your computer), but Windows encounters instructions to automatically load different programs from a myriad of places (most on the Web). These programs can hog resources and slow down your system's overall performance.

Of course, tracking down such unseen scoundrels can take a bit of time. When you have that time (and after you've done the other things in this list), jump in and try to figure out what's going on. Windows provides some utilities that can help, such as the System Configuration Utility (msconfig).

If you really have some extra time, you can wade into the murky waters of the Windows Registry. The Registry is the centralized database that controls virtually everything that happens in the operating system. It is mind-numbingly complex and staggeringly obtuse for normal humans to deal with. However, you can do things in the Registry that you cannot do in any other way.

Working in the Registry is not for the faint of heart. Make sure you double-check every action before you take it. One wrong step and you can bring your system to its knees.

Precautions for safety's sake

Cleaning a Windows system necessarily involves moving things, adding things, deleting things, and sometimes renaming things. Any of these tasks, while necessary, can have unintended consequences. Heaven forbid you should delete a critical system file or wipe out the wrong data key in the Registry.

These precautions help you avoid the bad things:

Don't delete files without knowing what you are deleting. If you're in doubt, simply move the file to a different directory or rename it. Then, if you restart your system (or the program) and find out you made a mistake, you can always move the file back or restore its original name.

Make periodic backups of your system. If you're getting ready to do a huge cleaning session, you might want to make a backup right before you start. If you want to rely on an older backup, you might want to have it close by, in case you need it when you start your cleaning session.

Be careful how you delete programs. In the wonderful days of DOS, in the misty past, programs usually consisted of a couple of files or all the files in a given directory. Not so in Windows. When you install a program, the installation program can move pieces and parts all over the place. When you run the program, it can move more of itself to still other places. Because of that, the best way to delete a program is to use either the uninstaller provided with the software or the Add/Remove Programs applet in the Control Panel. Don't just delete the main folder for the program — pieces and parts will remain scattered everywhere.)

Know what you are doing with the Registry. The Registry is a largely incomprehensible place. Be careful when you are changing or deleting things in the Registry. In fact, you should create a backup of the Registry before you do any big changes, or simply export a data key when you are getting ready to make more minor changes. (A data key is geekspeak for a branch in the Registry.) Windows does not have a Recycle Bin for the Registry — if you delete something by mistake, you will be glad you made a copy ahead of time.

If a new icon shows up on your desktop one day, don't double-click it. If you don't know why it's there, someone (or some program) has possibly deposited it there. If you don't know what it does, why double-click it and run it? A safer course of action is to right-click the icon, choose Properties, and then examine what programs the icon runs.

Keep your original program discs accessible. If you change the a program's installation, you probably need the discs. If you delete a part of the program you shouldn't, you probably need the discs. If you want to reinstall the program, you probably need the discs. Just keep them close. And it wouldn't hurt to have any necessary software keys (those pesky ten-character — or longer — codes required to install or unlock your software) for the discs, either.

Use only programs from reputable sources. There are lots of programs you can use to help with your system cleaning. You can download most of these programs from the Internet. However, some of the software you find on the Internet may not have been tested and can be reliable. If you download and run a program from a disreputable source, you could possibly infect your system with a virus or do some other system-crashing function.

The preceding precautions aren't in any particular order. They simply give you some guidance as you start on your cleaning quest. Rest assured, however, that you already possess the best safeguard you can have: common sense. Trust your common sense and it'll help you through a large number of the problems you may face.

As you're cleaning your system, keep a notepad and pen nearby. Jot down each cleaning step you take, along with any oddities you observe. This could be helpful if you later need to track down a problem that crops up.

About The Author:
Imran Rashid has a working knowledge about windows operating systems For more information visit www.ciscohighway.com
www.windowshighway.com
http://www.articleclick.com

Sunday 22 February 2009

Choosing the Right PC

With so many desktop PC’s to choose from, how do you know which is the best choice for your business? In this guide, we’ll cover many of the basics so that you can make an informed decision. First and foremost, here’s what you should do when choosing a model that is right for you.

Decide on a CPU (Central Processing Unit)—The CPU is essentially the brain of the computer, and thus, a great place to start when choosing a computer. The faster the processor’s clock speed, which is measured in megahertz (MHz) or gigahertz (GHz), the faster it can execute instructions. As a result, CPUs are divided into three groups: traditional single-core processors; dual-core processors, which boost performance for demanding applications; and quad-core processors, which provide unmatched performance for power-hungry multimedia and software applications.

Make sure you have enough memory (RAM)—Random Access Memory (RAM) is temporary storage that provides the working space for your computer to operate. Adding more RAM can result in an immediate and dramatic improvement in performance. Essentially, the greater the RAM, the more applications you can run at one time. RAM is relatively inexpensive, easy to install, and requires no configuration.

Select your hard drive capacity— Your desktop’s hard drive is where all data is stored, so when it comes to storage capacity, too much is never enough. And since enormous hard drives are very affordable (for most users, a 250GB drive is a good starting point), this means more for you and greater functionality for your computer.

CD/DVD Drives—CD and DVD drives read data on discs in a variety of formats. Some drives can also record data, images, music, or video to CD and/or DVDs. But beware: many of these drives create DVDs in formats that other drives and DVD players cannot read.

Consider security—Security might not be in the forefront of your mind when you’re shopping for a computer, but it should play a part in your decision. For example, virus and spyware are far more likely to target Windows PCs than MACs. Regardless of which one you choose, you should always use antivirus, firewall, and antispyware programs.

Choose by Brand—Surveys consistently show notable differences in technical support among computer brands. Since some brands are generally more expensive than others, those factors could help you decide which of two similarly equipped computers is the better buy.

These are just some of the many factors that can help your machine run more smoothly and efficiently. In the end, buying a good desktop primarily depends on what you will be using it for. Are you looking for a computer to perform basic tasks or to meet special requirements? Do you need to stay within a specific budget? Once you answer these questions, you’ll get the best value for your money and, more importantly, a computer you’re happy with.

About the Author

Laptop Accessories, Printers, Canon Digital Cameras

Article Directory: http://www.articlerich.com

Friday 20 February 2009

Software - Advantage And Disadvantages Of Free Antivirus Software

The anti virus software market for the most part has been a thriving one. With new viruses coming up everyday, anti virus software companies were always assured of good revenues.

But things started changing with the advent of free anti virus software. Given free anti virus software may not be as good as their commercial counterparts but they nevertheless, are pretty good for most computer users. Most free anti virus software come with even advanced detection technologies. What’s more, these free anti virus software keep their virus signature database updated regularly like any other commercial anti virus software!

Many people are of the opinion that commercial anti virus software are rip-offs. Most of them require renewal of licenses every year by asking a user to pay certain amount of money. If licenses are not renewed, such commercial anti virus software would stop detecting newer viruses. Free anti virus software, however, does not require such renewal of licenses. They are free to download, install, run and update as and when necessary.

One of the most popular free anti virus software is Grisoft’s AVG anti virus software. This free anti virus software is as good as a free software can get. There are no hidden malware and neither does one have to pay anything for using it. The virus signature database can also be updated without paying a fee! Unfortunately, this free version is however, meant for personal and non-commercial use only.

There are many other free anti virus software out there. Not all of them are however, good enough to provide proper security to computers. Some free anti virus software do not come with advanced detection technologies and therefore, may fail to detect different variants of viruses. Such free anti virus software are not simply worth anything. If you are planning to get a free anti virus, it is important you do some homework on the software. Check the reviews of other users to find out how good, in reality, the free anti virus software is before you start trusting it wholeheartedly!

By: Sumit Kumar Paswan

Article Directory: http://www.articledashboard.com

Monday 16 February 2009

5 Surefire Tips to Protect Your Computers from Hackers

Hacking attacks are constant worry and perennial headache for any network administrator. More interestingly and ironically, the best defense against them comes from hackers themselves. But these hackers are of a different kind and breed – they are ‘ethical hackers’.

While companies and government organizations all across the world are spending huge sums on hiring professional network security experts or ethical computer hackers, you can make your computer secure by being a little more careful and by keeping your system equipped with next generation anti-hacking solutions. Let’s see how…

1. Always use the latest version of anti-virus software applications. With good anti-virus software, whenever a hacker tries to access your machine you would be warned about it so that you can take necessary steps before any damage is done.

2. Always keep the firewalls in active mode as it will prevent unauthorized entry by the hackers.

3. Keep checking the programs running on your system on a regular basis. In case, you come across some program that you might not have installed or which does not form part of standard operating system, then be alert and cross check it as it might be some sort of spam.

4. To minimize risk against virus attacks and hackers, keep your operating system up to date as it allows the machine to be aware of the latest discovered security holes. If you don’t do that, you are just giving open invitation to the hackers who just evolve from every failed or ‘taken care of’ hacking attack.

5. Never ignore the patches when they arrive for installation. Usually what happens is that a hacker makes a way to enter your computer through some common programs. By installing security fixes and patches you make your computer safe from hackers as they are developed with the sole motive to fix security related issues.

Well, these tips are just the primary precautions to keep your system safe from the hands of hackers. But it’s better to take help of experts to take care of security measures. Many companies nowadays employ ethical hackers with knowledge of network security, cracking and hacking to counter the menace of criminal hacking.

Let me explain a little more. Hackers are broadly categorized into three groups:

- Black-hat hacker- These are the malicious or criminal hackers that break into networks or computers, or create computer viruses.

- Grey-hat hacker: These are skilled hackers who have mixed characteristics of white and black-hat hackers. They usually hack for fun or challenge but in the process can do some pretty damaging things.

- White-hat hacker: These are ethical hackers whose task is to provide security and protection to IT systems. Such people are employed by companies to enhance their IT security and keep their network systems free of hackers and spammers.

Ethical hacking is thus fast becoming a chosen career option for young IT pros given the fact that the IT security market worldwide is growing by leaps and bounds. There are various courses available for computer hacking and network security training. Professional cracking tutorials and other courses prepare IT security pros for attractive careers in big organizations.

About the Author

Mandira Kumar is working as a network security consultant in a reputed IT firm in India. She is also an amateur writer who has contributed several insightful articles on the importance of cracking tutorial, ethical computer hacking training or network security training.

Article Directory: http://www.articlerich.com

Wednesday 11 February 2009

Microsoft Certification - Add One To Your Resume

Add Microsoft Certification to your resume and see how it helps your career path. Microsoft has created numerous targeted certification programs. These certification programs do not just offer a new career option to those who are looking for a career, but also offer skills enhancement knowledge to those who are employed in various career fields.

So let us start our discussion with how different Microsoft Certification programs can help you in your job.

Software Application Developer

If you are a Software Application Developer, then you should think about adding MCAD (Microsoft Certified Application Developed) and MCPD (Microsoft Certified Professional Developer) certifications to your resume. MCPD will familiarize you with skills relating to software development on a variety of platforms using Microsoft NET Framework 2.0. MCAD will make you an expert in application lifecycle from development to maintenance.

Those who want to enhance their analyzing and designing skills should definitely opt for MCSD (Microsoft Certified Solution Developer). This will give you complete knowledge of the application lifecycle from analysis through design, testing, development and maintenance.

Systems Engineer

For Systems Engineer professionals, there are several Microsoft Certification courses. A MCSE or MCSA would always be an added advantage in your career path. MCSE will provide you with skills relating to analysis of business requirements and design and implementation of infrastructures.

IT Business Analysts

IT Business Analysts benefit greatly from MCP or MCSD certifications. You can start with an Office Specialist Certification, which will make you an expert in using Microsoft Office products. You can then go on to add MCP. MCSD would be the ultimate certification in your field, as it would cover the entire application lifecycle from analysis through design, testing, development and maintenance.

System Analysts

As a System Analyst, you would benefit from MCAD or MCSD certifications. MCAD will familiarize you with the application lifecycle from development to maintenance. However, if you really want to improve your career path, you should go for MCSD, which will teach you everything about the application lifecycle.

Software Engineers

There are MCSD and MCSE Microsoft Certification courses designed for Software Engineers. MCSD certification will equip you with skills relating to designing and developing using Microsoft development tools, technologies and platforms. MCSE with provide you with the skills to analyze, design and implement infrastructures.

Technical Writer, Office Manager, Executive Assistant

If you are employed as Office Manager, Technical Writer or Executive Assistant, Microsoft Office Specialist certification is the right one for you. This certification is ideal for those who use Microsoft Office products on a daily basis. Specialist, Expert and Master are the three levels of Microsoft Office certification. You can start at the Specialist level. As you become more and more proficient, you can take exams to reach the Master level.

Network Administrators

Microsoft also offers MSCE certifications specifically designed for Network Administrators. Those who use Microsoft Windows and backoffice applications on a daily basis will now have the added knowledge to do the analysis, design and implementation of infrastructures, thanks to MSCE.

So irrespective of the field you are in, you can greatly benefit from all Microsoft certifications. First decide which certification will work the best for you and then proceed from there. These certifications will give you added skills to perform your job better. And this means a more productive career path. So find out which Microsoft Certification is ideal for you.

About the Author

James Copper is a writer for http://www.careerlaunch.co.uk where you can find information on getting a MCSE certification

Article Directory: http://www.articlerich.com

Monday 9 February 2009

Find Desktop Calendar Sourcing Today

If you are a merchant looking for desktop calendar sourcing, one service that can definitely help you find sourcing quick, affordably and easily is Made in China. Made in China is perhaps the most robust B2B E-commerce marketing platform online helping millions of businesses connect with each other to conduct trade. Made in China has been helping many businesses whether you are looking to purchase desktop calendar products, auto parts, electronics, etc connect with manufacturers and suppliers in Asia to prosper and grow long term business relationships.

Connect Now with Over 5 Million Members
Made in China is one of the largest marketing platforms on the web, however we realize that being big is not important unless the service you offer is top notch. With Made in China not only can you connect with over 5 million businesses, but you can instantly save time, money and resources due to the wealth of tools we offer.

Whether it is communicating with suppliers of desktop calendar products or researching the right product to sell in your home market, Made in China can help you gain the upper hand in competition in your local market.

Made in China Offers Comprehensive Trade Tools
Obviously, with the global market in full swing, many businesses are finding it difficult to compete. Made in China is perhaps the perfect solution for those looking to compete online or locally, because we can connect you with suppliers and manufacturers of desktop calendar suppliers instantly.

In addition, our service doesn’t stop there, we realize that overseas trade can be difficult and confusing at times and we are committed to offering our knowledge and services to make it easier for almost any business to trade efficiently and affordably- whether you are a one person enterprise or a large corporation.

Join Made in China for Free
We are so confident that you will find our service extremely useful; we offer businesses the ability to join Made in China for free. There is absolutely no risk, you can join Made in China for free today and see for yourself whether our long list of services, marketing platform and business community is right for you.

If you are looking to buy desktop calendar products or almost any other item available then Made in China should definitely be looked at. Visit our main website today for more information and to join for free.

Made in China is a global leader in B2B E-commerce export services providing a B2B online marketing platform for both Chinese enterprises and global buyers. For more information or to join please visit us at: http://www.madeinchina.com

Article Directory: http://www.articlerich.com

Thursday 5 February 2009

Difference Between Computer Rental and Computer Leasing

If you have a need for a computer for your home or business, but cannot afford to buy one outright, you have two basic options: you can rent a computer or you can lease one. While these two options may seem very similar, there are actually major differences between renting and leasing. Both are convenient, but for different situations. Understanding these differences will help you choose the best option for your needs.

What Is Renting a Computer

Renting a computer is a lot like renting a car. This is usually done for a temporary and short need for a computer. You pay a fee, which is far less than the cost of actually buying a computer, and are given a computer to use. This can be just one computer or it can be a complete network, depending on your needs, but you will only be using the equipment for a short period of time, ranging from a few days to a few months.

When Renting a Computer Works Well

When would you want to rent a computer? There are many situations when it might be convenient. Consider these options:

• School - Do you want to offer a short computer training program at your school or college setting? Renting a setup would save you money, and you could charge an additional fee to your students who wish to take the class. When the training period is over, you simply return the equipment.

• Conventions - When you present at a convention, you may wish to have specialized equipment to use to display your PowerPoint presentation. Instead of lugging your own equipment with you, dealing with it at the airport, and setting it up once you arrive at your location, you can rent the gear, have it set up for you when you arrive, and simply bring your presentation on a disk or drive.

• Travel - In general, traveling is a time when carrying your computer is difficult, particularly if you do not have a laptop. When you rent a computer, you can have it ready, configured, and waiting for you at your destination.

• Temporary moves - When businesses move into temporary settings, setting up and then quickly taking down an entire technology infrastructure is highly inconvenient. Renting for this short period of time eliminates this problem.

Computers and other specialized equipment can also be rented to help deal with special projects. For instance, if you have a big project coming online that would require an extra printer or computer, you can rent it for the duration of the project, rather than buying it and having it sit unused most of the year.

What Is Leasing a Computer?

Leasing a computer, like leasing a car, is a more long-term commitment. You will sign a lease agreement for a set period, such as a year or longer, and if you back out of the agreement you will pay a penalty. You will typically pay monthly for the equipment you are using, and technical support is often included in the package. Sometimes the agreement allows you to rent to own, but the main benefit of leasing is the fact that leasing computer equipment cost a lot less at the outset than buying it.

When Leasing Makes Sense

Leasing makes sense when a business does not have enough capital to buy computer equipment, yet must have it for long term needs. If your business needs computer equipment, but you cannot afford to buy it, leasing allows you to avoid taking on debt to meet your need. You can preserve your lines of credit for other potential expenses. Leasing a computer also works well for individuals who need one but cannot afford to buy one, and there are many rental companies that offer individual leases for home computers. Basically, any time you or your business needs a computer but cannot afford to buy one, leasing is a convenient option.

Article Source: http://www.articlesbase.com/computers-articles/difference-between-computer-rental-and-computer-leasing-756058.html

Monday 2 February 2009

Top 5 No-Cost Cyber Security Practices

Cyber security is complex, highly technical subject that is best left to the Asperger-nerd in the computer room battling against the pimply-faced hacker sucking down Mountain Dew in his mother's basement, right? It's a cat and mouse game that pits the white hats against the black hats, the antivirus computer scientists against the hackers, right? It's certainly not the realm of the average small business owner, right? Wrong, wrong, and wrong!

What if I told you that human error was more responsible for data breaches in 2008 than hacking? What if I told you that hacking was third on the Identity Theft Resource Center's (ITRC) categorized list of data loss methods? The reality is that cyber security is a people problem first and a technology problem second.

More Awareness, Less Reliance
I've come to a remarkable, if not depressing realization in my information technology career. Over the last 20 years of consulting, I've visited scores of clients in hundreds of facilities and I can easily count the number of times I was ever given any sort of cyber security orientation - exactly once. I've walked into propped-open back doors of more manufacturing facilities than you can shake a stick at, and more often than not waltzed right up to a machine control panel, hooked up my laptop, and started pounding away at the keyboard while smiling and waving at trusting operators I had never before met in my life. The realization is this; the vast majority of companies, large and small alike, is completely oblivious to the weakest link in the security chain; people.

The misperception that cyber security is all about technology is a serious mistake that is made by both small and large businesses. The small businesses often believe that they are not sophisticated enough to employ their own cyber security programs and, therefore, either ignore it altogether or simply outsource it to an IT subcontractor. The large businesses spend millions of dollars on intrusion prevention systems, biometric security, and other sophisticated technological countermeasures.

Hopefully by now I've made the point that cyber security is about much more than firewalls, Trojans, and keyboard loggers. So without further delay, here is a list of five no-cost practices every organization can implement that will go a long way toward securing their data.

Use Passwords, Use Them Well
OK, show of hands... how many of you are rolling your eyes? It sounds obvious, but password laziness and ignorance is still the number one vulnerability for computer systems. I understand how painful it is these days to maintain all of the user names and passwords in our lives these days. However, it is the world we live in and we must accept it and follow these bare minimum password practices:

  • No shared passwords: This is especially common in process automation where there are many users of the same machine. Everyone must have their own unique user name and password.
  • Complex passwords: Use combinations of letters and numbers, preferably composed of one or more words that are not in the dictionary. Why? Read this article about Dictionary Attacks.
  • Change passwords: This is probably the most annoying of these three practices, and I confess that it aggravates me to have to do. However, changing passwords periodically is one of the best ways to prevent misuse of a password that is unknowingly (or even deliberately) disclosed.

Utilize Automatic Updates
Unpatched operating systems and out of date virus definitions are like the gimpy prey of a flock; they are the first to be targeted by the hunter. Many computer viruses and other exploits rely on software vulnerabilities that are typically patched within days or weeks. However, it is not at all unusual for me to see network servers out of date by more than a year. Another common problem is for antivirus subscriptions to expire, preventing the virus definitions from updating.

Clean House
Every program loaded on a computer is a potential vulnerability. The fewer of them there are, the better. A typical Windows PC has loads of "crap-ware" installed on them that can and should be removed using the Add/Remove Programs option in Control Panel. Additionally, there are Windows Components (e.g. Messenger, Media Player) that should be removed if not used. Finally, there are usually Windows Services running by default that are not used. This particular cleanup is generally left to computer professionals, as it is not always obvious which of these is required and disabling the wrong service can lead to "unexpected behavior."

Create Policies
There are many reasons for establishing written computer and internet policies for employees. One, of course, is legal liability for the employer. The other is (or at least should be) educational. It's not enough to write up these policies; they need to be presented and explained in an open environment to ensure that they are understood and appreciated. These policies go far beyond telling users they can't surf porn on the company's computers. They need to include things like proper care and usage of portable storage devices, remote access procedures and policies, e-mail policies, etc...

Protect Sensitive Information
Insiders and subcontractors are another major vulnerability and care must be taken to provide information necessary for them to do their jobs, but no more. This is especially true of subcontractors, of which I am one, who are frequently given and/or create sensitive documents, diagrams, lists, and other data. It is important to establish guidelines for its use to ensure that the information is handled with care and returned or disposed of when the job is complete. As incredible as it sounds, a subcontractor published a complete schematic of Pearl Harbor Naval Base's power monitoring control system in a white paper available publically on the Internet (I just checked and the information has apparently been removed).

Data breach report from "2008 Data Breach Totals Soar", Jan 5, 2009, Identity Theft Resource Center

Jon DiPietro is an entrepreneur and technology consultant with 20 years' experience in software, web, and database development. His blog, Domesticating IT, offers tips, tricks, and advice for small businesses on a wide range of information technology subjects.

Article Source: http://EzineArticles.com/?expert=Jon_DiPietro

Sunday 1 February 2009

Where Can You Find Cheap Computer Software?

These days you’d be hard pressed to find a home or business that didn’t rely on a computer in some fashion. Homeowners pay their bills, do their banking, shop, do a budget report, do school work, create holiday and greeting cards, manipulate and print photos, play games.. the list goes on and on. Businesses do billing and invoicing, log inventories, do ordering and print invoices, manage their accounting, etc., etc.

In short, pretty much every phase of our lives is controlled in some facet by a computer and computers require certain software programs to be installed in order to perform the functions that we need them to perform. This is where a problem can come in for the computer user who doesn’t have a lot of disposable income - computer software can be pretty expensive, if you need half a dozen programs or more for your computer to do everything that you want it to do and you’ve got to pay full MSRP for those programs the cost could really become an issue.

So where does the computer user go when they need computer software, but don’t have a whole lot of money to spend on it? Here are a few ideas of how you can get your hands on some cheap computer software that will have your PC performing all of the functions that they desire, without putting too much of a strain on their wallet.

Shop Around

It’s no secret that retailers compete for your business; there are advertisements in the newspaper every weekend giving details of sales and specials. If you aren’t in the biggest of hurries, you can shop the sale papers for a little while to see who’s got the best deal on the software package you need. Some stores even do a price match with competitors, so even if one store advertises a better price on one item and one of their competitor’s beats them on another you may be able to bring in an advertisement and get the best possible prices on your software form the same store.

Use the Internet

Just like retail establishments compete for your business, so do online retailers. The beauty of online shopping is that your search won’t be limited by location. It makes no difference if the company with the best price is two thousand miles away or only twenty, because the product will be shipped right to your door. Just remember to factor in all applicable shipping charges when you are trying to figure out who has the best deal for the program you are looking for.

Go Right to the Source

A great place to find software for cheaper than retail prices is by going directly to the manufacturer’s website. Many manufacturers will offer direct downloads of popular software programs from their sites, this often allows you to get the programs for less money because there is no box, no packing materials, no shipping or handling, in fact very little if any overhead cost at all. You may also be able to get package software discounts if you buy more than one program from the same manufacturer and you may also be eligible for manufacturer rebates which will further lower an already discounted price.

Don’t be overly picky

Purchasing software for a lesser known manufacturer rather than from one of the industry’s heavy hitters could save you a bundle, and if you compare the features you just might find a program you like better from one of the smaller companies.

If you absolutely, positively need to have the software from the top manufacturer, see if you can get an older version of the program. New versions of computer software are produced all the time, if you’re willing to use 'last years' version when a retail store is trying to clear them out you could save quite a bit as well.

It most certainly pays to do your research and comparison shop when it comes to computer software, paying the full suggested retail price could end up costing you more than you paid for your computer (a lot more in some cases.), but if you shop around as suggested above you could end up spending a lot less while getting virtually the same programs.