Enter your email address:

Delivered by FeedBurner

feedburner count

Virus Baru The Trojan Horse yang menyerang Rekening Bank


Cara terbaik untuk melindungi diri dari penipuan keuangan online adalah dengan rajin memeriksa rekening bank Anda. Setidaknya, sampai sekarang.

Israel perusahaan berbasis Keamanan Trusteer telah menemukan sebuah virus komputer baru yang rumit yang tidak hanya membantu penipu mencuri uang dari rekening bank - itu juga mencakup jalurnya. 

Sebuah versi baru the widely prevalent SpyEye Trojan horse  yang bekerja dengan cara yang sama, hanya saja swap keluar sebagai halaman Web perbankan bukan video, mencegah dari pemegang rekening menyadari bahwa uang mereka hilang.

Trojan horse bekerja dengan dua langkah kuat untuk melakukan kejahatan elektronik.

Pertama, virus menunggu sampai pelanggan dengan komputer yang terinfeksi mengunjungi situs perbankan online, mencuri login mereka dan menipu korban dengan membocorkan informasi pribadi seperti informasi kartu debit.

Kemudian, setelah nomor kartu dicuri digunakan untuk pembelian, dan virus mencegah kunjungan lebih lanjut ke situs perbankan dan catatan transaksi bersih dari penipuan apapun. Yang mencegah - atau setidaknya menunda - konsumen dalam menemukan penipuan dan melaporkannya ke bank.

Your Ad Here

What to Do If Your Facebook Or Twitter Account is Hacked


Unfortunately, this scenario is a reality for all of us who use social networking -- it's not a matter of IF your Twitter or Facebook account will be hacked, but simply WHEN. I've been on the receiving end of messages from my friends whose accounts have been hacked. The message typically compliments me on some body part or requests me to click on a link to view a video of myself. Also, there are usually a number of misspellings in the message.

Be very careful when you get those kinds of messages, even when they are coming from trusted friends who would normally not engage in this type of behavior. Many of the messages are linked to a virus or some type of malware that either infects your computer or will gain access to your account and send all of your friends and followers spammy messages. If you do slip and click on one of these links, pay attention to what your virus scanning software tells you, especially if you get a security warning about a site.

If your Twitter account is hacked:

1. Visit Twitter's information page for problem resolution.

2. Log out of Twitter

3. Clear your browser cache (your browsing history and cookies and private info) and close down your browser.

For Internet Explorer: Go to Tools -- Internet Options, and then click on the "Delete" button under Browsing History. Check all of the boxes (except InPrivate Filtering data) and click on the "Delete" button.

For Firefox: Go to Tools -- Clear Recent History, and then click on the down-arrow next to "Details", check all of the boxes, and select "Everything" for the time range to clear.

4. Open a new browser window, log into Twitter, and change your password. You can also use the Twitter password reset feature to set a new password before logging in again.

5. Visit your settings page and check your Connections. Revoke access for any third-party application that you don't recognize.

6. Submit a support request to let them know you have taken all of the proper steps to reset your account and to request that your direct messaging capability be restored. You can also include info on any statuses that weren't posted by you in the body of the request.

7. Update your password in all of your third party applications as well. If a third party application (like Facebook, Twitterrific, Twhirl, etc.) is trying to use your old password to access your tweets, it will lock you out of your account.

If your Facebook account is hacked:

1. Visit Facebook's information page for problem resolution.

2. If you are still able to access your login email address, then use the "Forgot your password" link to prompt an email from Facebook with a password reset code. If you can't access your account, then use the link above.

3. Clear your browser cache (your browsing history and cookies and private info) and close down your browser as described above.

4. Your account could also have been phished/hacked by a phishing web site, worm, or malicious software. To ensure that all is safe again, refer to the "Warnings" section on Facebook.

Take care when using Twitter and Facebook. Trust your intuition, and if something doesn't look or feel right, ignore it or delete it before clicking on it. You will have probably saved yourself hours or headache in trying to restore a hacked account.
Internet Marketing Automation Coach Donna Gunter helps independent service professionals create prosperous online businesses that make more profit in less time. Would you like to learn the specific Internet marketing strategies that get results? Discover how to increase your visibility and get found online by claiming your FREE gift, TurboCharge Your Online Marketing Toolkit, at ==> http://www.TurbochargeYourOnlineMarketing.com

Article Source: http://EzineArticles.com/?expert=Donna_Gunter

Your Ad Here

Understanding Wireless LAN Networking and Long-Range Wireless LAN Communication


Understanding wireless and wireless LAN networking enable you to properly plan and design the effective deployment of wireless networks be it home-networking or using outdoor long-range WLAN for rural internet connectivity.

Wireless networking allows computers and peripherals to communicate using radio frequency (RF) transmissions rather than over conventional network cabling. Using wireless Ethernet adaptors, any device capable of being used on a regular computer network can be accessed over a wireless connection for task ranging from file and printer sharing to multimedia and internet access.

Wireless Ethernet Technology is outlined by a set of standards called IEEE 802.11. Although other wireless technologies and protocols exist, the term wireless is generally used in reference to the IEEE 802.11 standards.

The communication protocols for wireless networking are defined by the Institute of Electrical Engineers (IEEE) 802.11 standard, which incorporates the 802.11a, 802.11b and 802.11g protocols (although other standards are in progress). The most widely used of these is 802.11b (Wireless-B), which is more reliable than the faster 802.11a (Wireless-A) standard, and is more cost-effective to produce and operate as well. Wireless-G or 802.11g, is a newer protocol that is becoming more widely adopted by vendors as it is capable of speeds up to 54Mbps rather than the 11Mbps of 802.11b devices.

It is no longer rare to find devices that support all three standards, but generally, Wireless-G is designed to be backwards compatible with Wireless-B devices. Thus Wireless-B and Wireless-A devices will not work with each other, and neither are they compatible with Wireless-G devices.

Some manufacturers offer models with dual-band (Wireless A & G/B) auto-switch mode for greater communication flexibility. Network planners can plan their network deployment by using a combination of Wireless-B,G or A.

Wireless 802.11 standard utilizes the license-free radio frequency bands around the 2.4GHz and/or 5GHz ranges. The 802.11b and 802.11g protocols use the 2.4GHz band whereas 802.11a uses the 5GHz band. Wireless-B is by far the most popular standard, with the newer Wireless-G (802.11g) and Wireless-A (802.11a) closing in fast.

Wi-FI or Wireless Fidelity is a certification program established by the Wi-Fi Alliance to ensure interoperability of wireless devices. Originally, the term Wi-Fi was intended to be interchangeable with 802.11b, but more recently it has broadened to cover any 802.11 network.

WLAN or Wireless Local Area Network, is a computer network -or part thereof- that incorporates wireless devices. In a WLAN network, a conventional LAN set-up can be extended to include wireless devices using an access point. Although wireless networks can be completely independent of conventional network, WLAN usually forms part of an existing wired network.

Wireless Transmission ranges vary greatly and lowering the bandwidth will increase the coverage area, a standard 802.11b or 802.11g device will typically have a range of about 30m indoor and up to 120m line-of-sight outdoors. The main reason for the variance between indoors and line-of-sight coverage is that walls and other objects do impede the wireless signal. Because wireless transmissions are actually low frequency radio waves, they will pass through walls and other solid matter relatively easy. As distance increases, the throughput decreases. This is because lower signal strength result in dropped packets and result in a general decrease in network efficiency.

Understanding the technology in wireless and wireless LAN/WAN networking allows the planner the flexibility of using wired and wireless networks. There are areas that wired networks can not go owing to distance, terrain or topography thus if the planner has knowledge on wireless LAN networking, the simpler, faster and easy it is to deploy an effective wireless network.

Understanding how wireless LAN works will also help you plan deployment of a rural wireless internet access service. Wireless LAN is a very cost-effective solution for much needed internet connectivity requirements in far, remote villages. WISP is a good and potential business in remote areas.

Either you use commercial "off-the-shelf" WLAN gadget, tweak and improve its performance by using higher-gain outdoor antenna or buy a true-outdoor long-range Wireless LAN. For assured network performance, service-quality and less network downtime, we recommend using the latter.
The author , Allan Amps is a telecom sales & marketing employee with passion and interest for rural, remote internet connectivity solutions, wireless gadgets and internet home-based business.

He recently established a website - http://www.tech-ware-tips-startup-internet-business.com and [http://www.advanced-multi-profit-site.com] with the aim of generating income out of his interest and passion. The goal is to reach people yearning to start their own home-based business by providing valuable tips, guides and info of the best available solutions and programs that one can go into.

Article Source: http://EzineArticles.com/?expert=Allan_Ampoloquio

Your Ad Here