Today VMware released version 4.0 of Fusion, a popular option for running Windows (and other operating systems) on a Mac. VMware Fusion 4.0 offers hundreds of new features. The big news is full compatibility with Mac OS X 10.7 Lion, which for example makes it possible to add Windows applications in Launchpad, see them in Mission Control and switch between them using the multi-touch gestures.
You can for example have three virtual machines running Windows XP , Windows 7 and OS X Lion simultaneously. Better performance by up to 2.5 times faster 3D graphics over the previous version is also in the bargain.
It is also now possible to also run Mac OS X 10.7 Lion or Mac OS X Server (Leopard, Snow Leopard or Lion) in a virtual machine. Or you could migrate your entire Windows installation over to your Mac, as seen here:
Everything related to data security: antivirus and firewall software, server security, encryption and integrity.
Wednesday, September 14, 2011
Sunday, May 8, 2011
Software to Secure Android
A new software solution for the Android platform promises to prevent malicious programs from stealing personal information from users' phones.
With built-in security levels for each program, Android will do better in protecting personal information from hackers. Android's openness and the rapidly growing popularity has attracted some unwelcome attention in the form of hackers.
In order to better secure personal data, a group of researchers at North Carolina State University have developed a software called Taming Information-Stealing Smartphone Applications--Tissa. The software provides the card user more control over what information is distributed to third parties and might, the researchers can easily be adapted as necessary. It will still have to compete with more established solutions such as F-Secure Mobile Security.
The verification that takes place both when downloading and using third-party applications are made via four different levels: trusted, anonymized, bogus and empty. Ratings range from completely trusted not to disclose any information to a given program.
For the best possible dissemination thinks researchers can now contact Google with the hope that they bake into the solution directly in Android through an automatic so-called ota-update. The software is also said to be ported to other mobile operating systems such as Apple's IOS.
With built-in security levels for each program, Android will do better in protecting personal information from hackers. Android's openness and the rapidly growing popularity has attracted some unwelcome attention in the form of hackers.
In order to better secure personal data, a group of researchers at North Carolina State University have developed a software called Taming Information-Stealing Smartphone Applications--Tissa. The software provides the card user more control over what information is distributed to third parties and might, the researchers can easily be adapted as necessary. It will still have to compete with more established solutions such as F-Secure Mobile Security.
The verification that takes place both when downloading and using third-party applications are made via four different levels: trusted, anonymized, bogus and empty. Ratings range from completely trusted not to disclose any information to a given program.
For the best possible dissemination thinks researchers can now contact Google with the hope that they bake into the solution directly in Android through an automatic so-called ota-update. The software is also said to be ported to other mobile operating systems such as Apple's IOS.
Tuesday, March 22, 2011
Google forces increased security
Google is introducing mandatory SSL encryption for connecting to its service application interfaces in order to increase security for end users.
Google demands strict SSL requirements for accession to the api-service from fall 2011. Currently Google uses Secure Sockets Layer (SSL) protection for several of its service-based applications, such as Google Docs and Gmail. This will now be expanded to include application interfaces (APIs) for developers. From September 15, 2011 obliges the api-connections to the company's Google Documents List API, Google Spreadsheets API and Google Sites API uses SSL.
The idea of the encryption requirement is to increase the safety of traffic going between Google's services and end user clients and software to prevent content from being intercepted by unauthorized parties.
Google also announced that developers who use its existing OAuth authentication api will be able to continue for the https addresses. For end-users of Google's services will change to be minimal and are generally only visible in the form of URLs that begin with https instead of http. The addition of "s" indicates that the traffic is protected encryption, reducing the risk of so-called man-in-the-middle attacks, based on the interception of data traffic.
Recently, several other Web services started deploying ssl as basic protection. Last year, Microsoft's Hotmail email service supports this, while also rolls up the protection of its users. For micro-bloggers who rely on Twitter, ssl is optional but recommended.
Google demands strict SSL requirements for accession to the api-service from fall 2011. Currently Google uses Secure Sockets Layer (SSL) protection for several of its service-based applications, such as Google Docs and Gmail. This will now be expanded to include application interfaces (APIs) for developers. From September 15, 2011 obliges the api-connections to the company's Google Documents List API, Google Spreadsheets API and Google Sites API uses SSL.
The idea of the encryption requirement is to increase the safety of traffic going between Google's services and end user clients and software to prevent content from being intercepted by unauthorized parties.
Google also announced that developers who use its existing OAuth authentication api will be able to continue for the https addresses. For end-users of Google's services will change to be minimal and are generally only visible in the form of URLs that begin with https instead of http. The addition of "s" indicates that the traffic is protected encryption, reducing the risk of so-called man-in-the-middle attacks, based on the interception of data traffic.
Recently, several other Web services started deploying ssl as basic protection. Last year, Microsoft's Hotmail email service supports this, while also rolls up the protection of its users. For micro-bloggers who rely on Twitter, ssl is optional but recommended.
Saturday, March 12, 2011
Color e-Books with Color Book 1058
Spanish e-book reader Color Book is small, cheap and convenient. It has color display and can also handle photos, audio. Almost all e-book readers have monochrome displays. The electronic ink used in such as Kindle and Iriver Story unable to show colors. Spanish Energy Sistem has gone around this problem by letting a Color Book using an ordinary LCD screen.
The advantage of course is that it also can display comics, photos and film - and because the screen lights up, you can also read in the dark. Unfortunately the battery life might suffer. While a typical e-book readers has enough for twenty books on a single charge, Color Book's batteries will run out sooner.
Because it does not have WiFi support, you must also pair it with your computer using a cable to transfer the books. Compared with tablets and smart phones this feels awkward, but it does not cause any major problems to read e-books.
The advantage of course is that it also can display comics, photos and film - and because the screen lights up, you can also read in the dark. Unfortunately the battery life might suffer. While a typical e-book readers has enough for twenty books on a single charge, Color Book's batteries will run out sooner.
Because it does not have WiFi support, you must also pair it with your computer using a cable to transfer the books. Compared with tablets and smart phones this feels awkward, but it does not cause any major problems to read e-books.
Microsoft releases Internet Explorer 9 in March
Microsoft has long worked on Internet Explorer 9 and is now ready to launch the official version.It's at the show South by Southwest, SXSW, where Microsoft will unveil the official version of Internet Explorer 9. It has been working with the new browser for about a year and it has also gone to download a release candidate. The 14th March is the date set for the suitable candidate.
What's New in Internet Explorer 9, including a better overview of the downloaded files, improved tabbed browsing, support for HTML 5 and hardware acceleration. The latter is to make it faster to see such movies or play games through the browser window.
Microsoft themselves say that Internet Explorer 9 to offer a "more beautiful web", and it seems that some changes also occurred with the interface. On March 14 you should then be able to download the new version officially.
What's New in Internet Explorer 9, including a better overview of the downloaded files, improved tabbed browsing, support for HTML 5 and hardware acceleration. The latter is to make it faster to see such movies or play games through the browser window.
Microsoft themselves say that Internet Explorer 9 to offer a "more beautiful web", and it seems that some changes also occurred with the interface. On March 14 you should then be able to download the new version officially.
Sunday, February 20, 2011
Adobe fixes 13 bugs in Flash
Adobe released yesterday updated versions of Flash and Reader that fixes 13 bugs in Flash and 29 in Reader. In addition, Adobe released the first update to the Reader X, the company's new version of PDF software that will offer greater security.
Almost all the bugs related to the Reader was classified as critical, meaning they can be used by a hacker to gain control of a user's computer. All bugs but three were also Reader X which was released three months ago.
According to Adobe, they could none of the 26 bugs in Reader X used to attack a user's computer when the program uses so-called sandbox technology.
All 13 bugs for Flash was classified as critical, and Adobe recommends all users to update to the latest version. Flash 10.2 shall also offer better performance according to Adobe.
The latest versions of Flash and Reader are available for download from the Adobe website.
Almost all the bugs related to the Reader was classified as critical, meaning they can be used by a hacker to gain control of a user's computer. All bugs but three were also Reader X which was released three months ago.
According to Adobe, they could none of the 26 bugs in Reader X used to attack a user's computer when the program uses so-called sandbox technology.
All 13 bugs for Flash was classified as critical, and Adobe recommends all users to update to the latest version. Flash 10.2 shall also offer better performance according to Adobe.
The latest versions of Flash and Reader are available for download from the Adobe website.
Thursday, February 10, 2011
Restrict your Wireless from Hackers
Individuals are usually lazy about guarding their network protection although Wi-Fi is particularly susceptible to get compromised by a hacker. For that reason it is vital to make it secure so that you can keep away from security mistakes. The safety configuration can take some time and due diligence, but in turn it also gives a safe Wi-Fi network. There are easy measures that any typical individual can employ safeguard their Wi-Fi from hackers.
When you set up your world wide web connection, get extra care of your router rather than only focusing on the software inside your laptop or desktop computer. Also make absolutely sure to preserve the firmware up to date on your router.
As you may possibly know, a router makes use of the network address translation that functions like a firewall and will not allow ports to be scanned.
A firewall is totally essential for routers and wireless networks. So, make sure that you have put in a firewall computer program or hardware device and constantly keep it running. It will lessen the probabilities of your wireless getting hacked.
Router manufacturers typically give you some common usernames and passwords to access. These phrases are very familiar to hackers. Consequently you are suggested to modify it as quickly as probable so that you protect your Wi-Fi from attackers. Every and every technique in a Wi-Fi network employs its individual exclusive identify and quantity to entry the net. These are recognized as SSIDs. When you obtained the Wi-Fi network, you need to adjust the default SSID since it may well be acknowledged by other peoples and can produce safety hazards for your network.
Encryption is a special coding utilised by wireless routers to guard your network and it is generally unreadable for human. If you want to keep your network secured you really should use solid encryption and keep it on all the time in any other case hackers get the possibility to strike. Another quite critical factor is MAC addresses, which are the actual names of Wi-Fi devices that are utilised to enter net routers . These will limit the accessibility to your network and allow only the gadgets with a MAC address that are permitted by you. Always keep your operating system up to date and set up a good anti virus application and a spyware removal tool. If you are operating a wireless network, you get the ideal protection when employing WPA2 or WPA security.
Using webmail is generally the most secure. Free e-mail accounts the like of yahoo, or gmail usually maintain large levels of safety to their web-sites. However, this does not mean that you should act recklessly. You ought to get precautions and by no means click on unfamiliar links since hackers are so cunning and await mistakes on your side. If you visit your bank you need to decide on the safest route. Open a new browser window and go immediately to the website for login. Do your best to steer clear of links. There are often many folks on networks so never ever keep important files open to sharing. It might be dangerous.
If you adhere to these strategies to the letter, you have substantially far greater probabilities of avoiding hackers with the intention of making use of your Wi-Fi network illegally.
If you want more security softwaretips goto Best Security Software.
When you set up your world wide web connection, get extra care of your router rather than only focusing on the software inside your laptop or desktop computer. Also make absolutely sure to preserve the firmware up to date on your router.
As you may possibly know, a router makes use of the network address translation that functions like a firewall and will not allow ports to be scanned.
A firewall is totally essential for routers and wireless networks. So, make sure that you have put in a firewall computer program or hardware device and constantly keep it running. It will lessen the probabilities of your wireless getting hacked.
Router manufacturers typically give you some common usernames and passwords to access. These phrases are very familiar to hackers. Consequently you are suggested to modify it as quickly as probable so that you protect your Wi-Fi from attackers. Every and every technique in a Wi-Fi network employs its individual exclusive identify and quantity to entry the net. These are recognized as SSIDs. When you obtained the Wi-Fi network, you need to adjust the default SSID since it may well be acknowledged by other peoples and can produce safety hazards for your network.
Encryption is a special coding utilised by wireless routers to guard your network and it is generally unreadable for human. If you want to keep your network secured you really should use solid encryption and keep it on all the time in any other case hackers get the possibility to strike. Another quite critical factor is MAC addresses, which are the actual names of Wi-Fi devices that are utilised to enter net routers . These will limit the accessibility to your network and allow only the gadgets with a MAC address that are permitted by you. Always keep your operating system up to date and set up a good anti virus application and a spyware removal tool. If you are operating a wireless network, you get the ideal protection when employing WPA2 or WPA security.
Using webmail is generally the most secure. Free e-mail accounts the like of yahoo, or gmail usually maintain large levels of safety to their web-sites. However, this does not mean that you should act recklessly. You ought to get precautions and by no means click on unfamiliar links since hackers are so cunning and await mistakes on your side. If you visit your bank you need to decide on the safest route. Open a new browser window and go immediately to the website for login. Do your best to steer clear of links. There are often many folks on networks so never ever keep important files open to sharing. It might be dangerous.
If you adhere to these strategies to the letter, you have substantially far greater probabilities of avoiding hackers with the intention of making use of your Wi-Fi network illegally.
If you want more security softwaretips goto Best Security Software.
Subscribe to:
Posts (Atom)