Forums are useful resource to promote and market your business enterprise. Forums are good means to increase back links and visitors for your website. The other benefit is that you can discuss your problem with a large segment of experts and specialists. For this it is necessary to make the use of best forums available online. Looking for the best forums and posting in these, there are certain key factors which need to be kept in mind.
Always look for those forums that are associated with your business enterprise. This will be beneficial for your website when you will associate yourself with the forum having the relevant connection with your website theme. The forums related with your business will increase knowledge about the terms and activities related to your business.
Find those forums that have solid reputation and good page rank. It is generally seen that some forums do not have good reputation. Quality forum sites always attract more visitors and create constructive and healthy participation. More ever you can find quality article links and constructive evidence of participants to prove their points.
Forums create an atmosphere of active participation. You can get opinions and solutions from experts and specialists for any problem or query. Find those forums that are very active and create large memberships. This depends on the status of forum websites.
Forum posting need certain factors to be kept in mind. Always read the necessary guidelines in the forums before posting. There are general notifications to be followed in posting. When you are posting for the first time it is good to introduce yourself and then start active postings in the forum of discussions with other members. The status of the participant goes on increasing with the increase in the number of forums posted.
Always do the relevant and topic related postings which suits best with the associated category otherwise there are chances of getting forum banned or blocked by the experts moderator. You can put your website link in the signature of forums but do care about the number of words allowed for signatures. Other factor is never start a new thread for a topic which already exists. Such threads are stopped as moderator does not want to create duplicacy in threads.
It is advised not to submit any harsh, irritating and taunting comments in forums. It disturbs the healthy discussion environment. Also never give humourous comments as it disturbs the seriousness of the topic. The mediator may ban such forums. Try to provide a topic with enough proof and evidence that attracts more and more participants. This will inspire more and more members to participate in your forum thread and thus increase the length of your thread.
Keeping all these guidelines in mind you will be able to utilize the best forums which assists you in overall marketing and promotion of your business enterprise.
Nivea David writes articles for SEO. She has vast exposure in writing for Search Engine marketing. She is working for NDDW. For Search Engine Marketing, Search Engine Optmization and SEO Forums visit http://www.nddw.com/
Source :
http://www.valuablecontent.com/articles/28653/1/SEO-Forums---A-way-of-Web-Promotion
Wednesday, May 12, 2010
Yahoo Guidelines for submission and optimization
Will your website rank higher in yahoo search engine pages? Will you get listed in yahoo? These are the general questions that come in your mind while optimizing for yahoo. For this you need to follow certain submission and optimization guidelines to get listed.
To get listed in the yahoo, first step is to find the suitable category page that best suits your website. Keep searching until you find the right category. Submitting in the most specific category increases your website chances of getting listed easily and earlier. Keep your Meta tags descriptions short. Do not use heavy promotional language or brand name in your descriptions. Make sure your site is entirely complete before you submit. If your site is not up to 100% or running it can be blacklisted. Do not submit site having an under construction page. Yahoo gives preference to a site having clean basic design and good content.
Yahoo discards off the title that looks like promotional ad copy. This seems to be odd especially in a business that seems to be all about promoting yourself. So ignore the phrases like Best and unrivaled service in the title. Some times overdose of SEO in your copy can hurt you. Follow the yahoo instructions or else if you do not follow their rules and guidelines they will ban you.
Do not try to put in the submission form any type of misinformation that is wrong or on par with fraud for them. Other point is that yahoo requires the site to list the physical address of the business. They do not accept post office box type of address. This keeps the scam doers out of their search engines.
Yahoo prefers original and unique value content with a genuine value for the reader. Pages designed primarily for human being are ranked higher. Use hyperlinks to assist people finding interesting and related content. Use Meta tags in description that accurately describes the contents of your web page.
Avoid these tasks in the procedure of yahoo optimization for a website. Do not stuff your pages with duplicate or repeated content. Yahoo can penalize you for spamming. Don�t use doorway pages. Do not use any method to partially inflate search engine ranking. Don�t participate in link exchange with link farms. Don�t stuff your pages excessively or off topic keywords. Do not use text with same coder as the background color or text that is not easily read, too small or is placed in an area of the web page not visible to users. And the final instruction is do not use any cloaking techniques.
Yahoo is among the major search engines that exist in the World Wide Web and considered one of the most favorite by internet users. Submission and opmization in yahoo increases the chances of increase in traffic generate more queries and leads. Therefore Yahoo search engine submission and optimization service is on the priority list for all SEO companies. Client major need also includes the yahoo search engine submission and optimization service on the priority basis.
Nivea David writes articles for SEO. She has vast exposure in writing for Web Promotions. She is working for NDDW. For Search Engine positioning, website promotion and yahoo optimization visit http://www.nddw.com
Source :
http://www.valuablecontent.com/articles/28871/1/Yahoo-Guidelines-for-submission-and-optimization
To get listed in the yahoo, first step is to find the suitable category page that best suits your website. Keep searching until you find the right category. Submitting in the most specific category increases your website chances of getting listed easily and earlier. Keep your Meta tags descriptions short. Do not use heavy promotional language or brand name in your descriptions. Make sure your site is entirely complete before you submit. If your site is not up to 100% or running it can be blacklisted. Do not submit site having an under construction page. Yahoo gives preference to a site having clean basic design and good content.
Yahoo discards off the title that looks like promotional ad copy. This seems to be odd especially in a business that seems to be all about promoting yourself. So ignore the phrases like Best and unrivaled service in the title. Some times overdose of SEO in your copy can hurt you. Follow the yahoo instructions or else if you do not follow their rules and guidelines they will ban you.
Do not try to put in the submission form any type of misinformation that is wrong or on par with fraud for them. Other point is that yahoo requires the site to list the physical address of the business. They do not accept post office box type of address. This keeps the scam doers out of their search engines.
Yahoo prefers original and unique value content with a genuine value for the reader. Pages designed primarily for human being are ranked higher. Use hyperlinks to assist people finding interesting and related content. Use Meta tags in description that accurately describes the contents of your web page.
Avoid these tasks in the procedure of yahoo optimization for a website. Do not stuff your pages with duplicate or repeated content. Yahoo can penalize you for spamming. Don�t use doorway pages. Do not use any method to partially inflate search engine ranking. Don�t participate in link exchange with link farms. Don�t stuff your pages excessively or off topic keywords. Do not use text with same coder as the background color or text that is not easily read, too small or is placed in an area of the web page not visible to users. And the final instruction is do not use any cloaking techniques.
Yahoo is among the major search engines that exist in the World Wide Web and considered one of the most favorite by internet users. Submission and opmization in yahoo increases the chances of increase in traffic generate more queries and leads. Therefore Yahoo search engine submission and optimization service is on the priority list for all SEO companies. Client major need also includes the yahoo search engine submission and optimization service on the priority basis.
Nivea David writes articles for SEO. She has vast exposure in writing for Web Promotions. She is working for NDDW. For Search Engine positioning, website promotion and yahoo optimization visit http://www.nddw.com
Source :
http://www.valuablecontent.com/articles/28871/1/Yahoo-Guidelines-for-submission-and-optimization
The Power of Blogs for Writing Your Book
Nine out of ten professionals and small business owners have at least one book or information product inside their head, but lack the time and organizational skills to get it out into digital or print form.
You may cringe when you read this list of ten things keeping you from writing your book, because it rings too close to home. You may have already written a book or an e-book, or have come close to starting it. It's hard, we know it, and we've been there too. But go ahead and read this list, see if you can identify, and let's discuss a possible solution to the book writing problem.
1. I can't seem to find the time.
2. Every time I sit down to write I go blank.
3. I need uninterrupted time to immerse myself.
4. I need clarity on my message, but there's no one to consult with.
5. I don't know where to start or how to organize all the chapters.
6. I'm afraid of losing clients and having my business suffer if I take time away to write my book.
7. I agonize over the writing, the grammar, the sentence structure and punctuation.
8. I know what I have to say, just can't put it into written form without losing clarity and impact.
9. I keep thinking about all the time involved in writing the book, and wonder if it will ever bring me the results I want.
10. Once I get it written, I have no idea how to get it formatted, let alone marketed.
Ok, you know why you haven't started writing your book. Do you know why you need to write a book?
Why You Need to Publish a Book
Here are a few reasons why writing and publishing a book is important to you as an independent professional, small business owner, or solo-preneur:
1. Having a book, whether in digital, soft-cover, or hardcover establishes you as an expert in your field.
2. People buy from people they know and trust; reading your book is one step in creating client confidence and relationship.
3. Once people buy and read your book, they will want more of what you have to offer in the way of services and knowledge. Your book can attract readers into your sphere of potential clients; once they have bought your book, they are ready to buy other services from you.
4. A book is a great marketing tool, and people will actually pay for your expertise.
5. Books are one of the major sources of passive income for professionals; once it is published it can continue to generate sales for you, over the years and while you sleep.
6. If you don't get a book out soon, your competitors will have the edge, because many of them already have one and even two books out.
7. If you are a speaker, they make great bonus gifts and back-of-the-room sales.
8. They provide a platform for you to expose your readers to your mind and your heart, showing not only what you know, but how much you care. You can reveal your deepest philosophies through your writing, as well as your personal stories.
3 Solutions to the Book-Writing Problem
Of course, there is no problem if you have a lot of money. You just hire a book writer. There are many of them listed at Elance.com. Some professionals do this, especially when they need to get something published fast. However, is this really what you want to do as a professional who has an important message to convey?
Here is a list of solutions:
1. Hire someone to write your book for you.
2. Hire a writing coach who will walk you through the steps, chapter by chapter (again, for a substantial fee).
3. Bite the bullet, put your business on hold for a few months, and devote your time to just getting it written.
Expensive? Yes, all three solutions are expensive. They each have their advantages and disadvantages.
The Fourth Solution
Another solution ties in the power of blogging with book writing. Blogs are powerful web-based marketing tools, but they also are great for content management.
You can pick a category (for example, a chapter) each time you write a short article on your blog. After a period of time, export all your posts in that category, and rewrite it to form a completed chapter.
Your blog is also a great opportunity to build up an audience of interested readers. They can contribute feedback and ideas, by using your blog to leave comments.
Upon completion of your book, you will find you already have an audience of interested buyers for your book.
If you don't have a blog yet, go ahead and create one. They are simple to set up and use (we recommend getting an account at Typepad.com). (There are many other blog software providers, even free ones, but they lack some of the features you may want later on.)
Your blog can be used to stay in touch with clients and to write your thoughts in an informal way. A blog is like having a conversation with people interested in your subject or expertise. Once your book is finished and formatted, you can then use your blog to market it. You already have a built in audience, hungry for your content.
To read more about how this system works and how you can benefit, go to this site: blogtobook.com � the way you think about writing your book will shift and you'll see it in a whole new light!
For more leading edge Internet Marketing tips subscribe to The Blog Squad's ezine Savvy eBiz Tips at http://www.savvyebiztips.com. To learn about using social media tools like blogs, go to http://www.buildabetterblog.com. Denise Wakeman & Patsi Krakoff are The Blog Squad and can be found online at http://www.blogsquad.biz
Source :
http://www.valuablecontent.com/articles/29639/1/The-Power-of-Blogs-for-Writing-Your-Book
You may cringe when you read this list of ten things keeping you from writing your book, because it rings too close to home. You may have already written a book or an e-book, or have come close to starting it. It's hard, we know it, and we've been there too. But go ahead and read this list, see if you can identify, and let's discuss a possible solution to the book writing problem.
1. I can't seem to find the time.
2. Every time I sit down to write I go blank.
3. I need uninterrupted time to immerse myself.
4. I need clarity on my message, but there's no one to consult with.
5. I don't know where to start or how to organize all the chapters.
6. I'm afraid of losing clients and having my business suffer if I take time away to write my book.
7. I agonize over the writing, the grammar, the sentence structure and punctuation.
8. I know what I have to say, just can't put it into written form without losing clarity and impact.
9. I keep thinking about all the time involved in writing the book, and wonder if it will ever bring me the results I want.
10. Once I get it written, I have no idea how to get it formatted, let alone marketed.
Ok, you know why you haven't started writing your book. Do you know why you need to write a book?
Why You Need to Publish a Book
Here are a few reasons why writing and publishing a book is important to you as an independent professional, small business owner, or solo-preneur:
1. Having a book, whether in digital, soft-cover, or hardcover establishes you as an expert in your field.
2. People buy from people they know and trust; reading your book is one step in creating client confidence and relationship.
3. Once people buy and read your book, they will want more of what you have to offer in the way of services and knowledge. Your book can attract readers into your sphere of potential clients; once they have bought your book, they are ready to buy other services from you.
4. A book is a great marketing tool, and people will actually pay for your expertise.
5. Books are one of the major sources of passive income for professionals; once it is published it can continue to generate sales for you, over the years and while you sleep.
6. If you don't get a book out soon, your competitors will have the edge, because many of them already have one and even two books out.
7. If you are a speaker, they make great bonus gifts and back-of-the-room sales.
8. They provide a platform for you to expose your readers to your mind and your heart, showing not only what you know, but how much you care. You can reveal your deepest philosophies through your writing, as well as your personal stories.
3 Solutions to the Book-Writing Problem
Of course, there is no problem if you have a lot of money. You just hire a book writer. There are many of them listed at Elance.com. Some professionals do this, especially when they need to get something published fast. However, is this really what you want to do as a professional who has an important message to convey?
Here is a list of solutions:
1. Hire someone to write your book for you.
2. Hire a writing coach who will walk you through the steps, chapter by chapter (again, for a substantial fee).
3. Bite the bullet, put your business on hold for a few months, and devote your time to just getting it written.
Expensive? Yes, all three solutions are expensive. They each have their advantages and disadvantages.
The Fourth Solution
Another solution ties in the power of blogging with book writing. Blogs are powerful web-based marketing tools, but they also are great for content management.
You can pick a category (for example, a chapter) each time you write a short article on your blog. After a period of time, export all your posts in that category, and rewrite it to form a completed chapter.
Your blog is also a great opportunity to build up an audience of interested readers. They can contribute feedback and ideas, by using your blog to leave comments.
Upon completion of your book, you will find you already have an audience of interested buyers for your book.
If you don't have a blog yet, go ahead and create one. They are simple to set up and use (we recommend getting an account at Typepad.com). (There are many other blog software providers, even free ones, but they lack some of the features you may want later on.)
Your blog can be used to stay in touch with clients and to write your thoughts in an informal way. A blog is like having a conversation with people interested in your subject or expertise. Once your book is finished and formatted, you can then use your blog to market it. You already have a built in audience, hungry for your content.
To read more about how this system works and how you can benefit, go to this site: blogtobook.com � the way you think about writing your book will shift and you'll see it in a whole new light!
For more leading edge Internet Marketing tips subscribe to The Blog Squad's ezine Savvy eBiz Tips at http://www.savvyebiztips.com. To learn about using social media tools like blogs, go to http://www.buildabetterblog.com. Denise Wakeman & Patsi Krakoff are The Blog Squad and can be found online at http://www.blogsquad.biz
Source :
http://www.valuablecontent.com/articles/29639/1/The-Power-of-Blogs-for-Writing-Your-Book
Making money using forums
Internet Forums + Business = Money2
Internet forums are a popular way of socializing and holding discussions on any topic. These forums are popularly known as message or bulletin boards. Now, these forums have turned into a sort of a community, where members can discuss anything. They can seek advice, solve their problems by consulting with other members, etc. These forums are also divided into topics concerning various aspects like relationships, a specific product, a game, fashion, etc.
Many Internet lingos are widely used in these forums. The best thing about these Internet forums is that it also has the potential to generate some serious cash. The trick to make cash using Internet forums is simple. The following tips will give you some ideas to make money out of discussions.
� Joining a Forum: This requires a certain amount of research. First, identify your potential customers and find out which websites and forums they frequently visit. If your business is related to selling super bikes, join a community that has similar interests.
� Obey the Rules: When you join the forum, do not indulge in trolling and other activities that can get you banned from the forum. Read the terms and conditions carefully before joining any forum.
� Offer your expertise: When you join a forum, don�t start off immediately by marketing your products. We all know that time is money, but if you want to make money through Internet forums, you require a little patience to make money. When your fellow members face any problem or need some suggestions to buy a bike (or any product/ service), offer your expertise. Let them know that you can solve their problems assuring them to trust you. It would be much more easy to sell your products, once they trust you.
� Develop a good marketing strategy: Strategy is the keyword for any business. While using Internet forums, remember that there are fewer dos and more don�ts. This is because there are many restrictions that some forums have. Try abiding to them. Don�t try and sell your products forcibly. That is a huge turn off for the members. Once your fellow members are assured that you are an expert in your field, try to suggest your products and give a brief description for it. But again, don�t always talk about business. Share your hobbies and interests with others. Not all forums allow using marketing links. Do a research and you will find some forums that allow their usage.
� Use a signature: As some forums don�t allow including links in their posts, using a forum signature is the next best thing. Your signature usually opens a new page that gives personal information about yourself. If other members like your postings, they will surely visit your profile. In order to promote your products or services you can include a link in your profile page that will enable other members to view your products.
� View other profiles: Show some interest towards other members. View their profiles and get an idea of their likes and dislikes.
You can use these forums to your best advantage by advertising your business. The best way to know your fellow forum members is by posting your comments and participating in debates. Once they know that you are the expert, everything depends on your selling skills. Last word of advice, don�t limit yourself to just one forum, join as many as you can.
Ryan Chua is a professional IT and Online marketing consultant for the past 5 years. Ever since running his own traffic and profit generating websites, he has been teaching others how to do the same for their own online endeavours. For more information, visit http://www.ForumSecretsRevealed.com
Source :
http://www.valuablecontent.com/articles/31216/1/Making-money-using-forums
Internet forums are a popular way of socializing and holding discussions on any topic. These forums are popularly known as message or bulletin boards. Now, these forums have turned into a sort of a community, where members can discuss anything. They can seek advice, solve their problems by consulting with other members, etc. These forums are also divided into topics concerning various aspects like relationships, a specific product, a game, fashion, etc.
Many Internet lingos are widely used in these forums. The best thing about these Internet forums is that it also has the potential to generate some serious cash. The trick to make cash using Internet forums is simple. The following tips will give you some ideas to make money out of discussions.
� Joining a Forum: This requires a certain amount of research. First, identify your potential customers and find out which websites and forums they frequently visit. If your business is related to selling super bikes, join a community that has similar interests.
� Obey the Rules: When you join the forum, do not indulge in trolling and other activities that can get you banned from the forum. Read the terms and conditions carefully before joining any forum.
� Offer your expertise: When you join a forum, don�t start off immediately by marketing your products. We all know that time is money, but if you want to make money through Internet forums, you require a little patience to make money. When your fellow members face any problem or need some suggestions to buy a bike (or any product/ service), offer your expertise. Let them know that you can solve their problems assuring them to trust you. It would be much more easy to sell your products, once they trust you.
� Develop a good marketing strategy: Strategy is the keyword for any business. While using Internet forums, remember that there are fewer dos and more don�ts. This is because there are many restrictions that some forums have. Try abiding to them. Don�t try and sell your products forcibly. That is a huge turn off for the members. Once your fellow members are assured that you are an expert in your field, try to suggest your products and give a brief description for it. But again, don�t always talk about business. Share your hobbies and interests with others. Not all forums allow using marketing links. Do a research and you will find some forums that allow their usage.
� Use a signature: As some forums don�t allow including links in their posts, using a forum signature is the next best thing. Your signature usually opens a new page that gives personal information about yourself. If other members like your postings, they will surely visit your profile. In order to promote your products or services you can include a link in your profile page that will enable other members to view your products.
� View other profiles: Show some interest towards other members. View their profiles and get an idea of their likes and dislikes.
You can use these forums to your best advantage by advertising your business. The best way to know your fellow forum members is by posting your comments and participating in debates. Once they know that you are the expert, everything depends on your selling skills. Last word of advice, don�t limit yourself to just one forum, join as many as you can.
Ryan Chua is a professional IT and Online marketing consultant for the past 5 years. Ever since running his own traffic and profit generating websites, he has been teaching others how to do the same for their own online endeavours. For more information, visit http://www.ForumSecretsRevealed.com
Source :
http://www.valuablecontent.com/articles/31216/1/Making-money-using-forums
The Crack Code For Palm Hand Held Device
Delicate preferences for Palm hand held devices spirit help you prefer the birth right device. Straightforward things like taking a color screen before the operating routine accessible on your device can contain a mammoth shock on how good operates and machinery used for you. A color screen seems like a completely irrelevant facet, but this is truly something to affects how well a device machinery used for you. If you are comfortable using Microsoft on your home computer before the laptop next using the compartment computer is a painless transition. Pull out an audio book imperfection into the San Disk certificate development slot, found on the top side border, along a segment border before on the back side of your hand held device.
If it is a smart phone that you want, to which combines a Palm hand held devices and a cell phones, various model connections offer internet and email functionality, a detailed the ivories plus camera. One of the distinguishing appearance is the faculty to warm sync the device with your delicate workstation. We know to the ruling poor quality compartment computer is an thrilling and expensive endeavor, so work partially respect to bargain individuals huge deals. Battery backup giving out power convey supercharged gaming applications to tell somebody to be used for a closer and additional efficient gaming knowledge. With your hand held devices you can track your fuel efficiency, mileage.
You can obtain recent before used cell phones by the best likely cost by either e-Bay or Amazon. Voice navigation and route guidance routine used for your hand held devices. Software spirit soon leaves to access drop a line to management in sequence hand held device procedure. As of the varied array of enlightening software used for them. Creator of interactive stories is games as well as golf, chess and solitaire. A certificate person who reads allows you to work at blue tooth certificate people who read. The focal difference involving two models is to Palm hand held are better acknowledged used for simplicity while the compartment computer is normally an additional skilled device with a Windows look and feel.<
And as the undeveloped, flexible platform integrates definitely with existing machinery infrastructures, hand held procedure and contain to grow to be the preferred well chosen amid healthcare administrators and information technology managers. Recently, the hospice began the original segment of a hand held the initiative, purchasing 150 hired hand held devices used for the residents, faculty and organization of the anesthesiology territory. You can leave references in vogue your text to hand held device. However, we need to be aware it if you have digital sales people helping you. G-Phone machinery can add voice communication to the existing data applications anywhere Palm is used.
These awards are influential as educators be taught how hand held devices applications are perceived by colleagues are knowledgeable going on for the products before contain first hand experience with them. Some hand held device companies believes to consumer spirit benefit from the innovative applications to spirit product from the enhanced interoperability involving Palm and a varied range of delicate machinery procedure. Made from no more than the maximum of quality supplies, this belongings is amid the greatest hand held devices belongings used for Palm hand held given away in vogue the humanity in our day.
Source :
http://www.readbud.com/Articles/Computers/The-Crack-Code-For-Palm-Hand-Held-Device
If it is a smart phone that you want, to which combines a Palm hand held devices and a cell phones, various model connections offer internet and email functionality, a detailed the ivories plus camera. One of the distinguishing appearance is the faculty to warm sync the device with your delicate workstation. We know to the ruling poor quality compartment computer is an thrilling and expensive endeavor, so work partially respect to bargain individuals huge deals. Battery backup giving out power convey supercharged gaming applications to tell somebody to be used for a closer and additional efficient gaming knowledge. With your hand held devices you can track your fuel efficiency, mileage.
You can obtain recent before used cell phones by the best likely cost by either e-Bay or Amazon. Voice navigation and route guidance routine used for your hand held devices. Software spirit soon leaves to access drop a line to management in sequence hand held device procedure. As of the varied array of enlightening software used for them. Creator of interactive stories is games as well as golf, chess and solitaire. A certificate person who reads allows you to work at blue tooth certificate people who read. The focal difference involving two models is to Palm hand held are better acknowledged used for simplicity while the compartment computer is normally an additional skilled device with a Windows look and feel.<
And as the undeveloped, flexible platform integrates definitely with existing machinery infrastructures, hand held procedure and contain to grow to be the preferred well chosen amid healthcare administrators and information technology managers. Recently, the hospice began the original segment of a hand held the initiative, purchasing 150 hired hand held devices used for the residents, faculty and organization of the anesthesiology territory. You can leave references in vogue your text to hand held device. However, we need to be aware it if you have digital sales people helping you. G-Phone machinery can add voice communication to the existing data applications anywhere Palm is used.
These awards are influential as educators be taught how hand held devices applications are perceived by colleagues are knowledgeable going on for the products before contain first hand experience with them. Some hand held device companies believes to consumer spirit benefit from the innovative applications to spirit product from the enhanced interoperability involving Palm and a varied range of delicate machinery procedure. Made from no more than the maximum of quality supplies, this belongings is amid the greatest hand held devices belongings used for Palm hand held given away in vogue the humanity in our day.
Source :
http://www.readbud.com/Articles/Computers/The-Crack-Code-For-Palm-Hand-Held-Device
What is a Virus?
Most viruses are written with a malicious intent, so that they can cause damage to programs and data in addition to spreading themselves. Viruses infect existing programs to alter the behavior of programs, actively destroy data, and perform actions on storage devices that render their stored data inaccessible.
Computer viruses attack the software of a computer such as operating systems, data files, application software, and e-mails. However, viruses do not affect the computer hardware.
Viruses infect computers and spread themselves using various methods. Some viruses attach themselves to a common program such as a popular game or word processor. When a person downloads the infected game and runs it, the attached virus program gets executed. The virus then loads itself into memory and searches for any other program on the disk. If the virus finds any program, it modifies the program by adding the malicious code to the program. The next time this program gets executed, it infects other programs, and the cycle continues thereafter.
There are many types of computer viruses such as a boot-sector virus, macro virus, e-mail virus, etc.
A boot-sector virus infects the boot record on hard disks and floppy disks, which is used to start the computer. When the computer is turned on or restarted, the virus is automatically executed. An infected boot disk may stop the computer from starting up.
A macro virus is a macro or script that attaches itself to a file or template. When the file is loaded, the instructions of the macro or script are executed.
An e-mail virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself to many people in the their e-mail address book.
Some other types of programs are also harmful to computers, which are not viruses such as a Trojan horse.
The main difference between a virus and a Trojan horse program is that a Trojan horse program does not replicate itself. A Trojan horse only destroys information on the hard disk. A Trojan horse program disguises itself as a legitimate program such as a game or utility. It often looks and initially acts in the same way as a legitimate program, but when it is executed, it destroys or corrupts data. A Trojan horse program can contain viruses, but it is not a virus itself.
A Worm uses computer networks and security holes to replicate itself. A Worm scans the network for another computer that has a specific security hole. It copies itself to the new computer using the security hole, and then starts replicating from there as well. A virus can have both virus and worm characteristics.
There are several anti-virus software that can detect, identify, and remove these viruses. As a precaution against viruses, we should take the following actions:
An anti-virus software that can detect, identify, and remove viruses should be installed on the computer.
All information downloaded from the Internet or some unknown resource must be immediately scanned for viruses by using an anti-virus software.
Any e-mail attachment that comes from unknown sources should never be opened.
About the Author:
uCertify was formed in 1996 with an aim to offer high quality educational training software and services in the field of information technology to its customers. uCertify provides exam preparation solutions for the certification exams of Microsoft, CIW, CompTIA, Oracle, Sun and other leading IT vendors. To know more about uCertify, please visit http://www.ucertify.com/
Source :
http://www.valuablecontent.com/articles/20645/1/What-is-a-Virus%3F
Computer viruses attack the software of a computer such as operating systems, data files, application software, and e-mails. However, viruses do not affect the computer hardware.
Viruses infect computers and spread themselves using various methods. Some viruses attach themselves to a common program such as a popular game or word processor. When a person downloads the infected game and runs it, the attached virus program gets executed. The virus then loads itself into memory and searches for any other program on the disk. If the virus finds any program, it modifies the program by adding the malicious code to the program. The next time this program gets executed, it infects other programs, and the cycle continues thereafter.
There are many types of computer viruses such as a boot-sector virus, macro virus, e-mail virus, etc.
A boot-sector virus infects the boot record on hard disks and floppy disks, which is used to start the computer. When the computer is turned on or restarted, the virus is automatically executed. An infected boot disk may stop the computer from starting up.
A macro virus is a macro or script that attaches itself to a file or template. When the file is loaded, the instructions of the macro or script are executed.
An e-mail virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself to many people in the their e-mail address book.
Some other types of programs are also harmful to computers, which are not viruses such as a Trojan horse.
The main difference between a virus and a Trojan horse program is that a Trojan horse program does not replicate itself. A Trojan horse only destroys information on the hard disk. A Trojan horse program disguises itself as a legitimate program such as a game or utility. It often looks and initially acts in the same way as a legitimate program, but when it is executed, it destroys or corrupts data. A Trojan horse program can contain viruses, but it is not a virus itself.
A Worm uses computer networks and security holes to replicate itself. A Worm scans the network for another computer that has a specific security hole. It copies itself to the new computer using the security hole, and then starts replicating from there as well. A virus can have both virus and worm characteristics.
There are several anti-virus software that can detect, identify, and remove these viruses. As a precaution against viruses, we should take the following actions:
An anti-virus software that can detect, identify, and remove viruses should be installed on the computer.
All information downloaded from the Internet or some unknown resource must be immediately scanned for viruses by using an anti-virus software.
Any e-mail attachment that comes from unknown sources should never be opened.
About the Author:
uCertify was formed in 1996 with an aim to offer high quality educational training software and services in the field of information technology to its customers. uCertify provides exam preparation solutions for the certification exams of Microsoft, CIW, CompTIA, Oracle, Sun and other leading IT vendors. To know more about uCertify, please visit http://www.ucertify.com/
Source :
http://www.valuablecontent.com/articles/20645/1/What-is-a-Virus%3F
Using a Proxy to Access Any WebSite
Many school classrooms primarily use computers and the �net to gather and save information. More and more colleges are offering entire learning environments via a web-based medium where no physical classroom is even necessary. Employers are also following suite and using the Internet as a mass communication tool for employers to interact electronically with one another with little cost. With this significant increase in the �net�s usefulness, there has come about stronger laws governing exactly what content is distributed.
One such very popular proxy (http://www.proxymy.com) has become notoriously popular for allowing students to access MySpace (a popular social networking website) from their school internet connection. Not only do proxies such as ProxyMy.com allow access to MySpace from school and colleges, but they are also almost necessary to use in the work environment. Employers are able to browse and track every single website their employees visits at work. An anonymous web based proxy can ensure privacy when surfing the web.
Access to otherwise filtered websites, and securing browsing privacy are two great benefits of a CGI based anonymizer proxy. Another great benefit, not to be overlooked, is also the security offered when browsing the net through a proxy. As great of an educational tool the internet has become, it is also a nefarious medium for advertisers to distribute all sorts of unwanted advertisement including: spam, pop ups, viruses, and predominantly spyware.
Source :
http://www.valuablecontent.com/articles/22441/1/Using-Proxy%26%2339%3Bs-to-Access-Any-WebSite
Three Dimensions to Protect your Computer
First - Strengthen the defense of your computer
- Install Firewalls
"Firewall" is an isolation technology to separate the internal network and the Internet. The firewall carries out some filtering when two networks communicate. It lets the data/person that you "agree" to enter your network, and also block the data/person you "do not agree" from your network. It can prevent they changes, copy, or destroys your material. To ensure the firewall get into work, you must keep it update.
- Install Anti-virus software
The key on computer virus is not "Kill" is "Prevent". You should install the Anti-virus software and start the real-time monitoring process and keep the software and the virus definition file updated. To guard against the newest virus, you should set the update process in a daily mode. Also, in every week, you should scan the computer completely for the virus.
- Guard against Spyware
Spyware is a program that is installed without the user authorization. It can get the information and send to a third party. Spyware can attached in software, executable image and break into the user computer. They are used to track the computer usage information, record the keyboard hits, or take a screen capture. To get rid from spyware, you can
- raise the security level of your browser
- install software to guard against from spyware
- verify with the official website about the software plan to install
Second - Against from attacks
- Refuse unknown software, emails and attachments
Don't download unknown software. Save all downloaded softwares into one single directory and scan it before install. Don't open any unknown email and its attachments. Many viruses are spread through by using email. Don't open unknown emails, especially those with interesting headline.
- Don't go to hacker and pornographic website
Many virus and spyware are come from these websites. If you browse this website and your computer is not secure enough, you can imagine what will happen next.
- Avoid share folders
Share folder is risky and outsider can surf around your folder freely. When you want to share folder, remember to set a password. If you are no need to share the folder any more, remove the sharing immediately. It is extremely danger to share the whole drive. If someone removes the system file, your machine may be down and cannot start up again.
Last - Keep Checking/Update
- Set different and complicate password
In Internet, there are thousand needs to use password, like e-banking, login account, email. Try to use different password for different operation, this can limit the loss if one of the passwords is broken into by someone. Avoid using meaningful password, like birthday, telephone number. You should use password with letter and number. One more thing is do not choose "Save Password" option.
- Beware of defraud
The number of defraud case in Internet is keep increasing. Build up a fake bank website, send out an email to ask for password. Before take any action, try to verify it is real or not. You can phone to bank hotline to ask, go to the bank to contact directly.
- Backup
Backup is the last step to guard against the attacks. If your computer is hacked, the operating system and softwares can be reinstalled. But the data can only be restored if you frequently make a backup.
Source :
http://www.valuablecontent.com/articles/24089/1/Three-Dimensions-to-Protect-your-Computer
- Install Firewalls
"Firewall" is an isolation technology to separate the internal network and the Internet. The firewall carries out some filtering when two networks communicate. It lets the data/person that you "agree" to enter your network, and also block the data/person you "do not agree" from your network. It can prevent they changes, copy, or destroys your material. To ensure the firewall get into work, you must keep it update.
- Install Anti-virus software
The key on computer virus is not "Kill" is "Prevent". You should install the Anti-virus software and start the real-time monitoring process and keep the software and the virus definition file updated. To guard against the newest virus, you should set the update process in a daily mode. Also, in every week, you should scan the computer completely for the virus.
- Guard against Spyware
Spyware is a program that is installed without the user authorization. It can get the information and send to a third party. Spyware can attached in software, executable image and break into the user computer. They are used to track the computer usage information, record the keyboard hits, or take a screen capture. To get rid from spyware, you can
- raise the security level of your browser
- install software to guard against from spyware
- verify with the official website about the software plan to install
Second - Against from attacks
- Refuse unknown software, emails and attachments
Don't download unknown software. Save all downloaded softwares into one single directory and scan it before install. Don't open any unknown email and its attachments. Many viruses are spread through by using email. Don't open unknown emails, especially those with interesting headline.
- Don't go to hacker and pornographic website
Many virus and spyware are come from these websites. If you browse this website and your computer is not secure enough, you can imagine what will happen next.
- Avoid share folders
Share folder is risky and outsider can surf around your folder freely. When you want to share folder, remember to set a password. If you are no need to share the folder any more, remove the sharing immediately. It is extremely danger to share the whole drive. If someone removes the system file, your machine may be down and cannot start up again.
Last - Keep Checking/Update
- Set different and complicate password
In Internet, there are thousand needs to use password, like e-banking, login account, email. Try to use different password for different operation, this can limit the loss if one of the passwords is broken into by someone. Avoid using meaningful password, like birthday, telephone number. You should use password with letter and number. One more thing is do not choose "Save Password" option.
- Beware of defraud
The number of defraud case in Internet is keep increasing. Build up a fake bank website, send out an email to ask for password. Before take any action, try to verify it is real or not. You can phone to bank hotline to ask, go to the bank to contact directly.
- Backup
Backup is the last step to guard against the attacks. If your computer is hacked, the operating system and softwares can be reinstalled. But the data can only be restored if you frequently make a backup.
Source :
http://www.valuablecontent.com/articles/24089/1/Three-Dimensions-to-Protect-your-Computer
Basic Rules of Scam Baiting
The goals of scam baiting carry the pleasure of baiters and their readers. To that end, a general status symbol among scam baiters is the collection or display of a photographic "trophy," a picture apparently taken of the scammer, typically while holding custom made signs, or in odd poses with exact props (such as placing a fish on one's head). Other trophies could include documents such as oaths and the pseudo legal documents, taken as the 419 scamr as a step forward towards a hopeless goal.
There are handfuls on common sense basic rules, which a scam baiter should follow:
1. The first rules is to have a good anti-virus software running on your system all the time and do keep the virus definitions ready. This is must for any computer which has internet connection but it is most significant for the scam baiting.
2. Make sure you don�t believe in anything, which a scammer tells you until you know it is true. In case scammer tells you �here is my photo� you could argue it isn�t. If on Monday the scammer tells you its Monday, check the calendar. It�s possibly Tuesday.
3. Next you should make sure that you do not give any real personal information to the scammer. This needs to be very obvious. Any actual personal information carries your real name, real address, place of work, real bank account number, and personal e-mail address and so on.
4. Remember you should never go to meet any scammer in person, regardless of their location given. As most scammers are just nothing more than pretty cheat artists, there had been many cases of muggings, kidnappings and also murder of people who had gone to meet with 419 scammers. Please do not do it.
5. And the most important rule is, you should never involve directly any innocent third parties in your scam bait. No matter how much you may hate you boss or your ex-spouse, don�t take revenge through this. You should not take on the identity of any real person existing or do not send a scammer to meet with any real person.
Source :
http://www.valuablecontent.com/articles/24212/1/Basic-Rules-of-Scam-Baiting
Online back up addresses resource constraints and regulatory requirements
Despite the growing value and necessity of digital data, many organizations do not take adequate steps to safeguard their data because they do not have the in-house expertise or financial resources.
But information is the lifeblood of many businesses and an increasingly valuable and costly organizational asset. Coupled with this reality are regulatory pressures that mean every business will have to implement a strategy to safeguard their data or face dire consequences.
Unbridled Growth
Exponential does not begun to describe the proliferation of data at the dawn of the new millennium � digital files are not only more numerous but they have ballooned in size as faster computers with increased capacity have been widely adopted in the business world.
But the amount of data and growing file sizes are no longer the most pressing problem � data storage has been commoditized and for most businesses eminently affordable; what poses the biggest problem is managing this data and more importantly safeguarding it from disaster in manner that makes sense for users and of course, easily retrievable.
Complexity Compounds Quantity
While it�s no longer feasible to save your important data on a floppy disk that you can carry around in your pocket, large file sizes aren�t that much of a problem anymore if data is being stored locally, whether it�s on a single office PC or on a shared server. Large organizations nowadays have the benefit of networked storage to handle large amounts of files that must be shared across an organization.
The complexity of this data combined with the variety formats and numerous storage locations mean corralling this data for effective back up poses an enormous challenge for any organization. Even large companies with sizeable IT departments have many conflicting priorities that mean managing a back up strategy can be just one of many demands on their time amidst troubleshooting employee-related problems and capital IT infrastructure deployments.
Regulatory Forces at Work: Privacy�
Simply hosting information for business purposes leads to challenges with the birth of a number of significant regulatory policies in the past decade both in Canada and the U.S. that dictate how third-party information must be managed and governed.
The law gives individuals the right to know why an organization collects, uses or discloses personal information as well as the right to expect an organization to collect, use or disclose personal information reasonably and appropriately, and not use the information for any purpose other than that to which the individual has consented.
Ultimately, from a data storage point of view, this means organizations that collect third party data must know where it is stored and protect it from being lost.
�Transparency
While some rules and regulations relate to privacy, others relate to transparency. After a slew of high profile corporate accounting scandals, the Sarbanes-Oxley Act of 2002 also known as the Public Company Accounting Reform and Investor Protection Act of 2002 established new or enhanced standards for all U.S. public company Boards, Management, and public accounting firms.
The Act contains 11 sections, ranging from additional corporate board responsibilities to criminal penalties, and requires the U.S. Securities and Exchange Commission (SEC) to implement rulings on requirements to comply with the new law. From a data storage view point, this means corporations must be able to provide certain information when required; loss of that data, even if accidental, could lead to severe legal penalties.
Back Up As a Matter of Course
While data protection can be a complex process with multiple steps, these challenges do not preclude any organization from having a back up solution in place, particularly given the technology available.
Backups most often fail because users forget to perform them and then leave the media behind in the computer. For backup to be effective, it has to be a simple, automated function scheduled to occur regularly without any user involvement beyond the initial set-up.
This is especially true for organizations who can not dedicate staff or resources to backing up data.
A backup works best if scheduled for overnight so the event doesn't interrupt workers with slowed computers or hogged bandwidth. Most services allow for data encryption before transmission; this can help allay fears of users concerned about hosting all their data on a shared server.
Online back up boasts a number of benefits:
A backup works best if scheduled for overnight so the event doesn't interrupt workers with slowed computers or hogged bandwidth. Most services allow for data encryption before transmission; this can help allay fears of users concerned about hosting all their data on a shared server.
Online back up boasts a number of benefits:
� Optimization of IT resources
- Less downtime
- Efficient data protection
- Less risk of untested, unproven backups
- Protection multi-office remote environments
- Support for complex multi-platform and multi-application enterprises
- Ensure regulatory compliance
- Avoid technological threats
- Reduction of risk and liabilities
Optimize by Archiving
While disk storage is more commoditized than ever before, that doesn�t mean some business don�t encounter shortages. In additions, the above mentioned regulatory requirements mean companies are often stuck storing data they rarely access but must retain.
By moving to an online back up model, organizations can electronically archive files that aren�t required for the day-to-day operations for the company and reduce capital expenditures by avoiding additional purchases of data storage hardware.
Electronic archiving provides an automated policy-based solution to create point-in-time archives that move older and inactive data off of production equipment and out of normal active backup cycles. Archives can keep point-in-time copies of important data for many reasons including regulatory or bookkeeping requirements. Managed data archives can be managed for a defined lifetime through the policy-automation engine, just like backed-up data. You can quickly and easily retrieve the archived data, control and manage your data and effectively extend your data storage capabilities without the need for more expensive online storage.
Electronic archiving eliminates any worry about media corruption; obsolescence; storage conditions; retrieval; hardware obsolescence and malfunctions; media alignment issues; oxidization; and re-catalogue and sorting issues.
Storagepipe Solutions provides world-class corporate data protection solutions including online backup and recovery, data and email archiving and business continuity. Storagepipe allows businesses of all sizes to decrease operations costs and complexity, optimize IT resources, reduce risks and liabilities, and protect more data more efficiently and reliability. Storagepipe combines extensive industry experience with the best technology solutions to exceed customer expectations and deliver the most comprehensive, secure and turn-key online backup and recovery and business continuity services. Additional information about Storagepipe Solutions can be found at www.storagepipe.com.
Source : http://www.valuablecontent.com/articles/30337/1/Effective-implementation-eliminates-downtime%2C-ensures-business-continuity
Seven Common DoS Attack Methods
Hackers have an armory of methods to pass Denial of Service (DoS) attacks. The following seven sections emphasize the degree of the quandary faced by organizations trying to battle the DoS threat. TippingPoint provides solutions to battle these common methods of DDoS attacks:
� Vulnerabilities
� Zombie Staffing
� Attack Tools
� Bandwidth Attacks
� SYN Floods
� Established Connection Floods
� Connections-Per-Second Floods
Method 1 � Vulnerabilities
Attackers can effort to collide a service or fundamental operating system in a straight line through a network. These attacks immobilize services by exploiting shock absorber spread out and other accomplishment dodge that exist in defenseless servers. Vulnerability attacks do not want widespread resources or bandwidth to commit; attackers only need to know of the survival of a susceptibility to be able to develop it and cause widespread injure. Once an attacker has control of a vulnerable service, request, or operating system, they abuse the opening to immobilize systems and in the end crash an whole network from within.
Method 2 � Zombie Conscription
The same vulnerabilities used to collide a server allow hackers to change vulnerable PCs into Distributed Denial of Service zombies. Once the hacker develop the susceptibility to increase manage of the system, they plant a backdoor into the system for later use in commiting DDoS attacks. The Trojan or similar disease provides a trail into the system. Once the attacker has the path, they tenuously control the network, making the server a �Zombie� that waits for the given attack authority. Using these zombies, attackers can send a huge number of DoS and DDoS attacks with secrecy. Viruses can also be used for Zombie conscription. For instance, the MyDoom bug was designed to convert PCs into Zombies that attacked SCO and Microsoft at a prearranged time programmed into the virus. Other viruses fit backdoors that let hackers to open coordinated attacks, rising the sharing of the attacks across networks around the sphere. The following figures detail how attackers make and begin these attacks against a network.
Method 3 � Attack Tools
Through zombie recruitment, hackers use secret communication channels to contact and manage their zombie military. They can choose from hundreds of off-the-shelf backdoor programs and tradition tools from websites. These tools and programs begin these attacks to penetrate and control networks as zombie armies to pass additional attacks from within. Once they have the zombie systems, they can use other tools to send a solitary command to all zombies concurrently. In some cases, commands are carried in ICMP or UDP packets that can go around firewalls. In other cases, the zombie �phones home� by making a TCP link to the master. Once the relation is created, the master can manage the Zombie.
The tools used to attack and control systems comprise:
� Tribe Flood Network (TFN) � Spotlight on Smurf, UDP, SYN, and ICMP reverberation apply for floods.
� Tribe Flood Network 2000 (TFN2K) � The updated version of TFN.
� Trinoo � Focuses on UDP floods. Sends UDP packets to chance purpose ports.
The size is configurable.
� Stacheldraht � Software tool that focuses on TCP, ACK, TCP NULL, HAVOC, DNS floods, and TCP packet floods with random headers.
DDoS Protection tools are growing both in terms of covert channel completion and in DDoS flooding methods. New tools exploit random port numbers or work across IRC. Further, smarter tools cleverly mask flooding packets as lawful service requests and/or bring in a high degree of chance. These improvements make it more and more hard for a port-filtering device to divide attack packets from lawful traffic.
Method 4 � Bandwidth Attacks
When a DDoS attack is opened, it can often be detected as a important change in the arithmetical work of art of the network transfer. For example, a typical system might consist of 80 percent TCP and a 20 percent mix of UDP and ICMP. A change in the arithmetical mix can be a signal of a new attack. For example, the Slammer maggot resulted in a rush of UDP packets, whereas the Welchi worm shaped a flood of ICMP packets. Such surges can be DDoS attacks or so-called zero-day attacks � attacks that develop secret vulnerabilities.
Method 5 � SYN Flood
One of the majority common types of DoS attacks is the SYN Flood. This assault can be launched from one or more attacker equipment to put out of action access to a target server. The attack use the device used to found a TCP connection. Every TCP link requires the conclusion of a three-way handclasp before it can pass data:
� Connection Request � First packet (SYN) sent from the supplicant to the server, preliminary the three-way handclasp
� Request Acknowledgement � Second packet (SYN+ACK) sent from the server to the requester
� Connection Complete � Third packet (ACK) sent from the supplicant back to the server, implementation the three-way handshake
The attack consists of a flood of unacceptable SYN packets with spoofed source IP addresses. The spoofed source address causes the target server to react to the SYN with a SYN-ACK to an unwary or absent source machine. The aim then waits for an ACK packet from the source to total the link. The ACK never comes and ties up the connection table with a awaiting connection ask for that by no means completes. The bench will rapidly fill up and devour all obtainable capital with invalid requests. While the number of link entries may differ from one server to another, tables may fill up with only hundreds or thousands of requests. The result is a denial of service since, once a table is full, the target server is unable to service lawful requests. The difficulty with SYN attacks is that each request in separation looks benign. An unacceptable ask for is very difficult to differentiate from a lawful one.
The complexity with SYN assault is that each request in separation looks caring. An invalid request is very hard to differentiate from a lawful one.
Method 6 � Established Connection Flood
An Recognized Connection Flood is an development of the SYN Flood attack that employs a array of zombies to commit a DDoS attack on a aim. Zombies found apparently lawful connections to the end server. By using a large number of zombies, each creating a large number of connections to the target, an attacker can make so many connections that the aim is no longer able to believe to lawful link requests. For example, if a thousand zombies make a thousand connections to a end server, the server have got to run a million open connections. The result is similar to a SYN Flood attack in that it devour server funds, but is even more difficult to sense.
Method 7 � Connections Per Second Floods
Connections Per Second (CPS) Flood attacks flood servers with a high rate of connections from a apparently valid source. In these attacks, an attacker or army of zombies attempts to drain server resources by rapidly setting up and ripping down TCP connections, perhaps begining a request on each link. For example, an attacker strength use his zombie army to frequently obtain the home page from a target web server. The resulting load makes the server tremendously lethargic. visit DDoS Protection
source : http://www.valuablecontent.com/articles/36560/1/Seven-Common-DoS-Attack-Methods
� Vulnerabilities
� Zombie Staffing
� Attack Tools
� Bandwidth Attacks
� SYN Floods
� Established Connection Floods
� Connections-Per-Second Floods
Method 1 � Vulnerabilities
Attackers can effort to collide a service or fundamental operating system in a straight line through a network. These attacks immobilize services by exploiting shock absorber spread out and other accomplishment dodge that exist in defenseless servers. Vulnerability attacks do not want widespread resources or bandwidth to commit; attackers only need to know of the survival of a susceptibility to be able to develop it and cause widespread injure. Once an attacker has control of a vulnerable service, request, or operating system, they abuse the opening to immobilize systems and in the end crash an whole network from within.
Method 2 � Zombie Conscription
The same vulnerabilities used to collide a server allow hackers to change vulnerable PCs into Distributed Denial of Service zombies. Once the hacker develop the susceptibility to increase manage of the system, they plant a backdoor into the system for later use in commiting DDoS attacks. The Trojan or similar disease provides a trail into the system. Once the attacker has the path, they tenuously control the network, making the server a �Zombie� that waits for the given attack authority. Using these zombies, attackers can send a huge number of DoS and DDoS attacks with secrecy. Viruses can also be used for Zombie conscription. For instance, the MyDoom bug was designed to convert PCs into Zombies that attacked SCO and Microsoft at a prearranged time programmed into the virus. Other viruses fit backdoors that let hackers to open coordinated attacks, rising the sharing of the attacks across networks around the sphere. The following figures detail how attackers make and begin these attacks against a network.
Method 3 � Attack Tools
Through zombie recruitment, hackers use secret communication channels to contact and manage their zombie military. They can choose from hundreds of off-the-shelf backdoor programs and tradition tools from websites. These tools and programs begin these attacks to penetrate and control networks as zombie armies to pass additional attacks from within. Once they have the zombie systems, they can use other tools to send a solitary command to all zombies concurrently. In some cases, commands are carried in ICMP or UDP packets that can go around firewalls. In other cases, the zombie �phones home� by making a TCP link to the master. Once the relation is created, the master can manage the Zombie.
The tools used to attack and control systems comprise:
� Tribe Flood Network (TFN) � Spotlight on Smurf, UDP, SYN, and ICMP reverberation apply for floods.
� Tribe Flood Network 2000 (TFN2K) � The updated version of TFN.
� Trinoo � Focuses on UDP floods. Sends UDP packets to chance purpose ports.
The size is configurable.
� Stacheldraht � Software tool that focuses on TCP, ACK, TCP NULL, HAVOC, DNS floods, and TCP packet floods with random headers.
DDoS Protection tools are growing both in terms of covert channel completion and in DDoS flooding methods. New tools exploit random port numbers or work across IRC. Further, smarter tools cleverly mask flooding packets as lawful service requests and/or bring in a high degree of chance. These improvements make it more and more hard for a port-filtering device to divide attack packets from lawful traffic.
Method 4 � Bandwidth Attacks
When a DDoS attack is opened, it can often be detected as a important change in the arithmetical work of art of the network transfer. For example, a typical system might consist of 80 percent TCP and a 20 percent mix of UDP and ICMP. A change in the arithmetical mix can be a signal of a new attack. For example, the Slammer maggot resulted in a rush of UDP packets, whereas the Welchi worm shaped a flood of ICMP packets. Such surges can be DDoS attacks or so-called zero-day attacks � attacks that develop secret vulnerabilities.
Method 5 � SYN Flood
One of the majority common types of DoS attacks is the SYN Flood. This assault can be launched from one or more attacker equipment to put out of action access to a target server. The attack use the device used to found a TCP connection. Every TCP link requires the conclusion of a three-way handclasp before it can pass data:
� Connection Request � First packet (SYN) sent from the supplicant to the server, preliminary the three-way handclasp
� Request Acknowledgement � Second packet (SYN+ACK) sent from the server to the requester
� Connection Complete � Third packet (ACK) sent from the supplicant back to the server, implementation the three-way handshake
The attack consists of a flood of unacceptable SYN packets with spoofed source IP addresses. The spoofed source address causes the target server to react to the SYN with a SYN-ACK to an unwary or absent source machine. The aim then waits for an ACK packet from the source to total the link. The ACK never comes and ties up the connection table with a awaiting connection ask for that by no means completes. The bench will rapidly fill up and devour all obtainable capital with invalid requests. While the number of link entries may differ from one server to another, tables may fill up with only hundreds or thousands of requests. The result is a denial of service since, once a table is full, the target server is unable to service lawful requests. The difficulty with SYN attacks is that each request in separation looks benign. An unacceptable ask for is very difficult to differentiate from a lawful one.
The complexity with SYN assault is that each request in separation looks caring. An invalid request is very hard to differentiate from a lawful one.
Method 6 � Established Connection Flood
An Recognized Connection Flood is an development of the SYN Flood attack that employs a array of zombies to commit a DDoS attack on a aim. Zombies found apparently lawful connections to the end server. By using a large number of zombies, each creating a large number of connections to the target, an attacker can make so many connections that the aim is no longer able to believe to lawful link requests. For example, if a thousand zombies make a thousand connections to a end server, the server have got to run a million open connections. The result is similar to a SYN Flood attack in that it devour server funds, but is even more difficult to sense.
Method 7 � Connections Per Second Floods
Connections Per Second (CPS) Flood attacks flood servers with a high rate of connections from a apparently valid source. In these attacks, an attacker or army of zombies attempts to drain server resources by rapidly setting up and ripping down TCP connections, perhaps begining a request on each link. For example, an attacker strength use his zombie army to frequently obtain the home page from a target web server. The resulting load makes the server tremendously lethargic. visit DDoS Protection
source : http://www.valuablecontent.com/articles/36560/1/Seven-Common-DoS-Attack-Methods
Tuesday, May 11, 2010
Basics Of Blogs And Blogging
Have you heard other people talking on and on about their "blogs" while all you could do was smile and nod?
Yes, "blog" is a peculiar word, conjuring visions of mosquito-infested swamps, and you can't imagine why people would be eager to get more visitors to theirs.
But eager they are. In spite of the rather unfortunate name, blogs are the hottest things in communication since cell phones. Blogs are websites on which almost anybody can post information on almost any topic as often as they like. Blogs can be devoted to a single factual topic, or they can be the equivalent of personal diaries in which people record their private thoughts and observations about the world. The contents of a blog are limited only by the imagination of the blog's creator, or "author".
If you find the thought of your own blog appealing, and have an Internet-connected computer, here are some suggestions to help you both get a blog going and build an audience with whom you can share it:
First, choose a topic for your blog on which you will enjoy communicating, and prepare your material. You opinions on a subject are fine, as long as they are based on some underlying. There are always going to be those who know as much, about a topic as you, and if you want a credible blog, you need to be able to back up your statements.
Add some humor and personal experiences to your topic if you can. Writing a travel blog about places you have actually been, and about colorful locals whom you actually encountered, will make much better reading than just posting facts and figures picked up from travel sites and TV shows. Offer material which will appeal to both novice travelers--like how to avoid pickpockets--and more seasoned ones--like the best undiscovered attractions in a specific destination.
Don't limit your blog to your own experiences. Keep it updated with news that might affect those interested in your subject. While your experiences can give people valuable insight, recognize that your opinions about what happened to you or about a specific product are, after all, just opinions. Give people factual information which they can weigh for themselves.
Keep you blog current. On the Internet, news can become old in a matter of hours, and what happened a month ago is ancient history. Telling people considering a trip to Thailand that Thailand experienced a coup last September will do nothing to help them decide about a trip next month. Updating them on the peaceful state of affairs in Thailand today, however, will.
Updating your blog will require a commitment from you. You'll need to establish a regular time to search for and write about fresh news, and get it posted. There'll be times when not much has happened, and there'll be times when you can't type fast enough. But two or three times a week are not too many to post something new. Even it it's only to tell your readers that not much has been going on, share a few thoughts, and tell your readers when to next check in for your next entry, make an appearance. Your audience will keep coming back as long as they know you are.
Keep you blog as simple as you can, without sounding like you don't have a complete grasp of your subject. You want to appeal to as many people as possible, and nothing will drive those newly interested in a subject away faster than lots of technical jargon and statistics. You can provide complex information, as long as you make the effort to put it in user-friendly terms.
Find a memorable name for your blog, and use your blog editing feature to post it in large, bold-face type. "My Hiking Blog" will probably sound interesting only to Mom and Dad and only because you never write or call them while you're out adventuring. "Climbing through the Clouds" will appeal to those who either tackle the high places of the Earth, or want to.
Every so often, say, at the end of each month, archive your existing blog posts. Your blog editor will let you do this in a less than a minute. The entries will still be available for new blog readers who want to catch up, or those who want to reference your earlier writings. And list keywords for your archived work so that new traffic will be able to find its way to you.
Finally, make sure your blog is professionally presented. You have a spell checker, so use it. Proof-read your copy and correct any grammar or punctuation errors before you post your work. If you're not sure whether you are using a word properly, get help from an online dictionary. Respect your readers as intelligent, well-informed people who could just as easily spend their time elsewhere.
These suggestions may make your entry into the world of blogging more successful, but it's up to you to commit to building and keeping an audience.
http://www.goarticles.com/cgi-bin/showa.cgi?C=2872287
Yes, "blog" is a peculiar word, conjuring visions of mosquito-infested swamps, and you can't imagine why people would be eager to get more visitors to theirs.
But eager they are. In spite of the rather unfortunate name, blogs are the hottest things in communication since cell phones. Blogs are websites on which almost anybody can post information on almost any topic as often as they like. Blogs can be devoted to a single factual topic, or they can be the equivalent of personal diaries in which people record their private thoughts and observations about the world. The contents of a blog are limited only by the imagination of the blog's creator, or "author".
If you find the thought of your own blog appealing, and have an Internet-connected computer, here are some suggestions to help you both get a blog going and build an audience with whom you can share it:
First, choose a topic for your blog on which you will enjoy communicating, and prepare your material. You opinions on a subject are fine, as long as they are based on some underlying. There are always going to be those who know as much, about a topic as you, and if you want a credible blog, you need to be able to back up your statements.
Add some humor and personal experiences to your topic if you can. Writing a travel blog about places you have actually been, and about colorful locals whom you actually encountered, will make much better reading than just posting facts and figures picked up from travel sites and TV shows. Offer material which will appeal to both novice travelers--like how to avoid pickpockets--and more seasoned ones--like the best undiscovered attractions in a specific destination.
Don't limit your blog to your own experiences. Keep it updated with news that might affect those interested in your subject. While your experiences can give people valuable insight, recognize that your opinions about what happened to you or about a specific product are, after all, just opinions. Give people factual information which they can weigh for themselves.
Keep you blog current. On the Internet, news can become old in a matter of hours, and what happened a month ago is ancient history. Telling people considering a trip to Thailand that Thailand experienced a coup last September will do nothing to help them decide about a trip next month. Updating them on the peaceful state of affairs in Thailand today, however, will.
Updating your blog will require a commitment from you. You'll need to establish a regular time to search for and write about fresh news, and get it posted. There'll be times when not much has happened, and there'll be times when you can't type fast enough. But two or three times a week are not too many to post something new. Even it it's only to tell your readers that not much has been going on, share a few thoughts, and tell your readers when to next check in for your next entry, make an appearance. Your audience will keep coming back as long as they know you are.
Keep you blog as simple as you can, without sounding like you don't have a complete grasp of your subject. You want to appeal to as many people as possible, and nothing will drive those newly interested in a subject away faster than lots of technical jargon and statistics. You can provide complex information, as long as you make the effort to put it in user-friendly terms.
Find a memorable name for your blog, and use your blog editing feature to post it in large, bold-face type. "My Hiking Blog" will probably sound interesting only to Mom and Dad and only because you never write or call them while you're out adventuring. "Climbing through the Clouds" will appeal to those who either tackle the high places of the Earth, or want to.
Every so often, say, at the end of each month, archive your existing blog posts. Your blog editor will let you do this in a less than a minute. The entries will still be available for new blog readers who want to catch up, or those who want to reference your earlier writings. And list keywords for your archived work so that new traffic will be able to find its way to you.
Finally, make sure your blog is professionally presented. You have a spell checker, so use it. Proof-read your copy and correct any grammar or punctuation errors before you post your work. If you're not sure whether you are using a word properly, get help from an online dictionary. Respect your readers as intelligent, well-informed people who could just as easily spend their time elsewhere.
These suggestions may make your entry into the world of blogging more successful, but it's up to you to commit to building and keeping an audience.
http://www.goarticles.com/cgi-bin/showa.cgi?C=2872287
Living with the iPad: The One-Month Report
It's now been a month since the iPad came out, and Apple says it has sold over 1 million <http://www.pcmag.com/article2/0,2817,2362224,00.asp> of the devices. In that time, I've written about my initial impressions<http://blogs.pcmag.com/miller/2010/04/ipad_fun_absolutely_essential.php>and a number of posts about specific uses of the machine for reading newspapers<http://blogs.pcmag.com/miller/2010/04/reading_papers_on_the_ipad_sur.php>,
magazines<http://blogs.pcmag.com/miller/2010/04/can_the_ipad_save_magazines.php>, and books <http://blogs.pcmag.com/miller/2010/04/reading_on_the_ipad.php>. I'll follow up with one on productivity applications shortly.
But the biggest question for me remains: Does the tablet form factor really have staying power for a large audience? Even though I don't see it as a replacement for a notebook computer, the more I use the iPad, the more I'm convinced that the tablet is here to stay.
*Check out the 25 best apps for the iPad.<http://www.pcmag.com/article2/0,2817,2362572,00.asp>
*
I'll state up front that I've been wrong about the tablet form factor<http://blogs.pcmag.com/miller/2010/01/slate_computers_beyond_and_before_apple.php>before. I was a big fan of the original "tablet PCs," <http://www.pcmag.com/article2/0,2817,265001,00.asp> particularly "convertibles" that could be used as a laptop or a slate, and I used one for years for reading content. But in general, tablet PCs became a niche player in the PC market. They're used mainly in vertical markets such as health care. They were just too big and too clunky. But the iPad is different. At 1.5 pounds, it's easier to carry than tablet PCs; and with a battery life of about 10 hours, it lasts a lot longer. But more important, it has a lot more applications that are really designed for the form factor, with better support for the screen size and for the touch input panel. (Tablet PCs originally were designed to be used with a stylus, and while there are touch-screen versions, most of the software is still standard Windows packages).
The iPad has really changed my morning commute. I've been reading the *New York Times *Editors' Choice, *Wall Street Journal, *and *USA Today * applications <http://www.pcmag.com/article2/0,2817,2362978,00.asp> on the train, which is something I wasn't happy doing on a notebook, a smartphone, or a Kindle. And during my evening commute or on a longer flight, the iPad has worked well for reading magazines and
books<http://www.pcmag.com/article2/0,2817,2363159,00.asp>. I've long found tablets to be better than notebooks for reading, and the iPad is no exception.
In the evenings, I have often sat on the couch using the iPad to browse the web or to read e-mail while watching TV. This isn't as powerful as doing the same thing on a Windows or Mac notebook; there are sites I want to view that don't work right on the iPad because they use Flash video, or just because of inconsistencies in coding. But the overall experience is pretty good; and the fact that it turns on nearly instantly is a big win. It's just easier to reach for. But there are usually a couple of emails a night I can't handle on the iPad.
I'll write in more detail about my use of productivity applications on the device in a day or two, but I'll say now that it is *not *a replacement for a notebook computer.
*What the iPad lacks*
I was able to handle simple documents, presentations, and spreadsheets, and I expect the applications to get more powerful over time. But if you're looking for a device to create long documents or to edit big spreadsheets, I wouldn't recommend an iPad. There just are too many features missing.
There were two features I found myself missing most. I know some people think you can type on a flat piece of glass, and I certainly can answer e-mails that way. But I need a physical keyboard for doing any long writing. I've tried taking notes on an iPad, and the results weren't pretty.
The other feature I really missed was multitasking, or to be more specific, fast application switching. On a notebook, you can easily switch back and forth between a Web page and a document if you're doing research, or pop out of a document to check an email message. On the iPad, although each application stores your place, that process involves closing the application you're in, going back to the home screen, and then launching the other application. That just takes too much time.
I've been using the Wi-Fi model, and most of my use has either been at home, at the office, or on a train with downloaded periodicals and books. The 3G version went on sale on Friday<http://www.pcmag.com/article2/0,2817,2363261,00.asp>, and I noticed a good-sized line in front of the Apple store on 5th Avenue that afternoon. I do understand the appeal.
On a couple of days I tried out one of Sprint's Overdrive mobile Wi-Fi hotspots. That worked quite well on the train, even though there's no WiMax coverage in the New York area yet. That way, I could check out my mail on an iPad from the train, and certainly, the bigger screen is better for that purpost than a smart phone is. I was a bit concerned by how hot the Overdrive would get and by its battery life (about 3 hours on a charge), but it did work.
I've also tried using a Palm Pre as a Wi-Fi hotspot, using the MyTether<http://mytether.net/>application. This was a little complicated to set up initially, and it occasionally takes a minute or two to make the connection, but it also worked well for things like e-mail (and it also gets pretty hot). I wouldn't
recommend it for video, but then again, there are generally concerns that the quality of video over a 3G stream is
reduced<http://www.pcmag.com/article2/0,2817,2363330,00.asp>, something you'd expect over a slower connection.
Here is PCMag's full review of the
Overdrive<http://www.pcmag.com/article2/0,2817,2358748,00.asp>. and a story on it and other alternative mobile hotspots<http://www.pcmag.com/article2/0,2817,2362268,00.asp>in use with the iPad.
The big complaint about the iPad is that it is a "walled garden," and that's certainly true to some extent. (Cory Doctorow's piece at Boing Boing may have the best arguments against buying an iPad<http://www.boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-you-shouldnt-either.html>.) For instance, I do understand the problems with Flash support, but I still want to be able to see all the content on the Web. And I can understand wanting to install or sell applications without going through Apple's store.
0diggsdigg
But all the issues simply underscore the fact that the iPad really is a pretty amazing device. In some respects, it's easy to dismiss the device as a large iPod touch (or to rename the iPod touch as an "iPad Nano"), but that misses the point: The screen size enables some very different kinds of applications. Newspapers and magazines, books, and even applications such as IMDb and Pandora, are notably different on the iPad than in their iPod equivalents.
Again, I don't see the iPad as a replacement for a notebook computer, or for a smartphone. It belongs in a different category. But after using it for a month, it has become part of my daily computing routine--and for an extra device, that's saying a lot.
magazines<http://blogs.pcmag.com/miller/2010/04/can_the_ipad_save_magazines.php>, and books <http://blogs.pcmag.com/miller/2010/04/reading_on_the_ipad.php>. I'll follow up with one on productivity applications shortly.
But the biggest question for me remains: Does the tablet form factor really have staying power for a large audience? Even though I don't see it as a replacement for a notebook computer, the more I use the iPad, the more I'm convinced that the tablet is here to stay.
*Check out the 25 best apps for the iPad.<http://www.pcmag.com/article2/0,2817,2362572,00.asp>
*
I'll state up front that I've been wrong about the tablet form factor<http://blogs.pcmag.com/miller/2010/01/slate_computers_beyond_and_before_apple.php>before. I was a big fan of the original "tablet PCs," <http://www.pcmag.com/article2/0,2817,265001,00.asp> particularly "convertibles" that could be used as a laptop or a slate, and I used one for years for reading content. But in general, tablet PCs became a niche player in the PC market. They're used mainly in vertical markets such as health care. They were just too big and too clunky. But the iPad is different. At 1.5 pounds, it's easier to carry than tablet PCs; and with a battery life of about 10 hours, it lasts a lot longer. But more important, it has a lot more applications that are really designed for the form factor, with better support for the screen size and for the touch input panel. (Tablet PCs originally were designed to be used with a stylus, and while there are touch-screen versions, most of the software is still standard Windows packages).
The iPad has really changed my morning commute. I've been reading the *New York Times *Editors' Choice, *Wall Street Journal, *and *USA Today * applications <http://www.pcmag.com/article2/0,2817,2362978,00.asp> on the train, which is something I wasn't happy doing on a notebook, a smartphone, or a Kindle. And during my evening commute or on a longer flight, the iPad has worked well for reading magazines and
books<http://www.pcmag.com/article2/0,2817,2363159,00.asp>. I've long found tablets to be better than notebooks for reading, and the iPad is no exception.
In the evenings, I have often sat on the couch using the iPad to browse the web or to read e-mail while watching TV. This isn't as powerful as doing the same thing on a Windows or Mac notebook; there are sites I want to view that don't work right on the iPad because they use Flash video, or just because of inconsistencies in coding. But the overall experience is pretty good; and the fact that it turns on nearly instantly is a big win. It's just easier to reach for. But there are usually a couple of emails a night I can't handle on the iPad.
I'll write in more detail about my use of productivity applications on the device in a day or two, but I'll say now that it is *not *a replacement for a notebook computer.
*What the iPad lacks*
I was able to handle simple documents, presentations, and spreadsheets, and I expect the applications to get more powerful over time. But if you're looking for a device to create long documents or to edit big spreadsheets, I wouldn't recommend an iPad. There just are too many features missing.
There were two features I found myself missing most. I know some people think you can type on a flat piece of glass, and I certainly can answer e-mails that way. But I need a physical keyboard for doing any long writing. I've tried taking notes on an iPad, and the results weren't pretty.
The other feature I really missed was multitasking, or to be more specific, fast application switching. On a notebook, you can easily switch back and forth between a Web page and a document if you're doing research, or pop out of a document to check an email message. On the iPad, although each application stores your place, that process involves closing the application you're in, going back to the home screen, and then launching the other application. That just takes too much time.
I've been using the Wi-Fi model, and most of my use has either been at home, at the office, or on a train with downloaded periodicals and books. The 3G version went on sale on Friday<http://www.pcmag.com/article2/0,2817,2363261,00.asp>, and I noticed a good-sized line in front of the Apple store on 5th Avenue that afternoon. I do understand the appeal.
On a couple of days I tried out one of Sprint's Overdrive mobile Wi-Fi hotspots. That worked quite well on the train, even though there's no WiMax coverage in the New York area yet. That way, I could check out my mail on an iPad from the train, and certainly, the bigger screen is better for that purpost than a smart phone is. I was a bit concerned by how hot the Overdrive would get and by its battery life (about 3 hours on a charge), but it did work.
I've also tried using a Palm Pre as a Wi-Fi hotspot, using the MyTether<http://mytether.net/>application. This was a little complicated to set up initially, and it occasionally takes a minute or two to make the connection, but it also worked well for things like e-mail (and it also gets pretty hot). I wouldn't
recommend it for video, but then again, there are generally concerns that the quality of video over a 3G stream is
reduced<http://www.pcmag.com/article2/0,2817,2363330,00.asp>, something you'd expect over a slower connection.
Here is PCMag's full review of the
Overdrive<http://www.pcmag.com/article2/0,2817,2358748,00.asp>. and a story on it and other alternative mobile hotspots<http://www.pcmag.com/article2/0,2817,2362268,00.asp>in use with the iPad.
The big complaint about the iPad is that it is a "walled garden," and that's certainly true to some extent. (Cory Doctorow's piece at Boing Boing may have the best arguments against buying an iPad<http://www.boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-you-shouldnt-either.html>.) For instance, I do understand the problems with Flash support, but I still want to be able to see all the content on the Web. And I can understand wanting to install or sell applications without going through Apple's store.
0diggsdigg
But all the issues simply underscore the fact that the iPad really is a pretty amazing device. In some respects, it's easy to dismiss the device as a large iPod touch (or to rename the iPod touch as an "iPad Nano"), but that misses the point: The screen size enables some very different kinds of applications. Newspapers and magazines, books, and even applications such as IMDb and Pandora, are notably different on the iPad than in their iPod equivalents.
Again, I don't see the iPad as a replacement for a notebook computer, or for a smartphone. It belongs in a different category. But after using it for a month, it has become part of my daily computing routine--and for an extra device, that's saying a lot.
Monday, May 10, 2010
Living with the Apple iPad : One Month and Counting
But the biggest question for me remains: Does the tablet form factor really have staying power for a large audience? Even though I don't see it as a replacement for a notebook computer, the more I use the iPad, the more I'm convinced that the tablet is here to stay. I'll state up front that I've been wrong about the tablet form factor before. I was a big fan of the original "tablet PCs," particularly "convertibles" that could be used as a laptop or a slate, and I used one for years for reading content. But in general, tablet PCs became a niche player in the PC market. They're used mainly in vertical markets such as health care. They were just too big and too clunky. But the iPad is different. At 1.5 pounds, it's easier to carry than tablet PCs; and with a battery life of about 10 hours, it lasts a lot longer. But more important, it has a lot more applications that are really designed for the form factor, with better support for the screen size and for the touch input panel. (Tablet PCs originally were designed to be used with a stylus, and while there are touch-screen versions, most of the software is still standard Windows packages). The iPad has really changed my morning commute. I've been reading the New York Times Editors' Choice, Wall Street Journal, and USA Today applications on the train, which is something I wasn't happy doing on a notebook, a smartphone, or a Kindle. And during my evening commute or on a longer flight, the iPad has worked well for reading magazines and books. I've long found tablets to be better than notebooks for reading, and the iPad is no exception. In the evenings, I have often sat on the couch using the iPad to browse the web or to read e-mail while watching TV. This isn't as powerful as doing the same thing on a Windows or Mac notebook; there are sites I want to view that don't work right on the iPad because they use Flash video, or just because of inconsistencies in coding. But the overall experience is pretty good; and the fact that it turns on nearly instantly is a big win. It's just easier to reach for. But there are usually a couple of emails a night I can't handle on the iPad. I'll write in more detail about my use of productivity applications on the device in a day or two, but I'll say now that it is not a replacement for a notebook computer. I was able to handle simple documents, presentations, and spreadsheets, and I expect the applications to get more powerful over time. But if you're looking for a device to create long documents or to edit big spreadsheets, I wouldn't recommend an iPad. There just are too many features missing. There were two features I found myself missing most. I know some people think you can type on a flat piece of glass, and I certainly can answer e-mails that way. But I need a physical keyboard for doing any long writing. I've tried taking notes on an iPad, and the results weren't pretty. The other feature I really missed was multitasking, or to be more specific, fast application switching. On a notebook, you can easily switch back and forth between a Web page and a document if you're doing research, or pop out of a document to check an email message. On the iPad, although each application stores your place, that process involves closing the application you're in, going back to the home screen, and then launching the other application. That just takes too much time. I've been using the Wi-Fi model, and most of my use has either been at home, at the office, or on a train with downloaded periodicals and books. The 3G version went on sale on Friday, and I noticed a good-sized line in front of the Apple store on 5th Avenue that afternoon. I do understand the appeal. On a couple of days I tried out one of Sprint's Overdrive mobile Wi-Fi hotspots. That worked quite well on the train, even though there's no WiMax coverage in the New York area yet. That way, I could check out my mail on an iPad from the train, and certainly, the bigger screen is better for that purpost than a smart phone is. I was a bit concerned by how hot the Overdrive would get and by its battery life (about 3 hours on a charge), but it did work. I've also tried using a Palm Pre as a Wi-Fi hotspot, using the MyTether application. This was a little complicated to set up initially, and it occasionally takes a minute or two to make the connection, but it also worked well for things like e-mail (and it also gets pretty hot). I wouldn't recommend it for video, but then again, there are generally concerns that the quality of video over a 3G stream is reduced, something you'd expect over a slower connection. Here is PCMag's full review of the Overdrive. and a story on it and other alternative mobile hotspots in use with the iPad. The big complaint about the iPad is that it is a "walled garden," and that's certainly true to some extent. (Cory Doctorow's piece at Boing Boing may have the best arguments against buying an iPad.) For instance, I do understand the problems with Flash support, but I still want to be able to see all the content on the Web. And I can understand wanting to install or sell applications without going through Apple's store. But all the issues simply underscore the fact that the iPad really is a pretty amazing device. In some respects, it's easy to dismiss the device as a large iPod touch (or to rename the iPod touch as an "iPad Nano"), but that misses the point: The screen size enables some very different kinds of applications. Newspapers and magazines, books, and even applications such as IMDb and Pandora, are notably different on the iPad than in their iPod equivalents. Again, I don't see the iPad as a replacement for a notebook computer, or for a smartphone. It belongs in a different category. But after using it for a month, it has become part of my daily computing routine--and for an extra device, that's saying a lot. |
How Adobe CS5 Takes Advantage of 64-Bit, Multi-Core, and GPU Computing
Each year, the wonders of technology and some really great engineering keeps giving us computers that do more. Of course, many of the applications we run work just fine on older hardware. But I've been particularly interested in applications that can really take advantage of the latest trends in computer hardware.
Of relatively mainstream applications, some of the most processing-intensive applications are those that in Adobe's Creative Suite 5, which officially started shipping today. PCMag's full review of the suite starts here. But I spoke with the developers to find out more about how CS5 takes advantage of the new hardware.
Let's start with support for 64-bit operating systems. While the Windows version of Creative Suite 4 had some Windows 64-bit support, CS5 is the first version with real cross-platform support, according to Bryan O'Neil Hughes, Product Manager for Photoshop. The whole program was rewritten for the Mac's Cocoa framework to support 64-bit operations, and Hughes described 64-bit Windows 7 as being "much more robust" than the previous version. Most of the plug-ins have also been ported to 64-bit.
64-bit computing benefits certain operations, primarily those working with very large files. A number of factors create such files: many pictures, many layers, panoramas created from multiple shots, pictures with high dynamic ranges, and single images that are simply large. For instance, he noted that a single shot from a Canon 5D Mark II could take up 60 megabytes just on its own. When there is more data than available memory, Photoshop pages out to disk, and that's much slower than keeping the data in memory. In some situations, this can result in up to 10 times the performance.

While Photoshop will ship with both 32-bit and 64-bit versions, After Effects and Premiere Pro are 64-bit only. Vesideo technical evangelist Karl Soule describes Premiere as the first all-native 64-bit Cocoa non-linear editor.
Again, this allows for much larger files. Soule says this is crucial because the "baseline" has moved to HD video, with some high-end cameras beginning to use 4K (4,096-by-2,048-pixel) video capture, and Premiere Pro now supporting even higher resolutions, which are needed today mainly for incorporating still images.
For both Premiere Pro and After Effects, Adobe is recommending 4GB to 8GB of RAM, and Soule says power users who move between the two can take advantage of 16GB or more. Professionals working in digital cinema may even want 24GB, 32GB, or more, depending on how much they are rendering.
For instance, in After Effects, more memory means you can preview longer bits of HD video effects without fully rendering the scenes. So if you have 4GB, you might be able to preview only 6 to 8 seconds at a time; while with 32GB, you could preview 30 seconds of a full HD video.
Soule also says that Premiere has been particularly optimized to use multiple cores. In the Windows version, it can take multiple tasks and split them across cores; while on the Mac version, the program uses Grand Central to schedule the cores.
More after the jump.
In Photoshop, multicore and 64-bit support also speeds up a number of specific features dealing with Camera Raw features (where the files can be large) and for the impressive "content-aware fill" feature, which has gotten a lot of attention.
Both the photo and video products take advantage of GPU acceleration. Soule noted that Premiere Pro uses GPU accelerations for video decoding and also for more than 30 different effects, such as color correction, opacity, blur, chroma keying, etc. While this isn't required, it makes a big difference on the effects customers will "use day in and day out," he said.
These features specifically use Nvidia's CUDA architecture, which Soule said the company chose because it is farther along than the other platforms. The list of boards "recommended" for use with CS5 is heavily slated toward the professional Quadro line, though the GeForce 285 is also listed and it should really work on somewhat lesser boards.
After Effects uses the OpenGL framework for GPU acceleration, mostly for 3D compositing. This hasn't changed significantly from CS4.

Hughes said that Photoshop uses the GPU mainly for presenting additional content such as the "mixer brush," the HUD color picker,brush/clone preview, and so on. It's also used by the "Repoussé" feature in Paint, which extrudes objects to give them a 3D feel.
In addition, the GPU is being used to accelerate features such as Camera Raw and to enable you to view the image clearly at any view percentage. Again, you can use these tools without GPU acceleration, but it's a much smoother experience with the feature, and Hughes said this will work even with low-end discrete GPUs from either Nvidia or ATI.
Looking over the whole list of features that are enabled by more memory, multi-core support, and GPU acceleration, I'm struck by how some of the features seem pretty esoteric--but a lot seem likely to become very mainstream, such as working with larger HD video or scaling an image to any size you'd like. In many cases, you could implement these features without the new hardware, but the new hardware just makes the features fast enough so that actually you'd want to do it on a regular basis.
In an era where a lot of emphasis is placed on doing less on client computers and more on the servers, it's interesting to see the kind of features that today's more powerful desktops are enabling.
http://blogs.pcmag.com/miller/2010/04/how_adobe_cs5_takes_advantage.php
Of relatively mainstream applications, some of the most processing-intensive applications are those that in Adobe's Creative Suite 5, which officially started shipping today. PCMag's full review of the suite starts here. But I spoke with the developers to find out more about how CS5 takes advantage of the new hardware.
Let's start with support for 64-bit operating systems. While the Windows version of Creative Suite 4 had some Windows 64-bit support, CS5 is the first version with real cross-platform support, according to Bryan O'Neil Hughes, Product Manager for Photoshop. The whole program was rewritten for the Mac's Cocoa framework to support 64-bit operations, and Hughes described 64-bit Windows 7 as being "much more robust" than the previous version. Most of the plug-ins have also been ported to 64-bit.
64-bit computing benefits certain operations, primarily those working with very large files. A number of factors create such files: many pictures, many layers, panoramas created from multiple shots, pictures with high dynamic ranges, and single images that are simply large. For instance, he noted that a single shot from a Canon 5D Mark II could take up 60 megabytes just on its own. When there is more data than available memory, Photoshop pages out to disk, and that's much slower than keeping the data in memory. In some situations, this can result in up to 10 times the performance.
While Photoshop will ship with both 32-bit and 64-bit versions, After Effects and Premiere Pro are 64-bit only. Vesideo technical evangelist Karl Soule describes Premiere as the first all-native 64-bit Cocoa non-linear editor.
Again, this allows for much larger files. Soule says this is crucial because the "baseline" has moved to HD video, with some high-end cameras beginning to use 4K (4,096-by-2,048-pixel) video capture, and Premiere Pro now supporting even higher resolutions, which are needed today mainly for incorporating still images.
For both Premiere Pro and After Effects, Adobe is recommending 4GB to 8GB of RAM, and Soule says power users who move between the two can take advantage of 16GB or more. Professionals working in digital cinema may even want 24GB, 32GB, or more, depending on how much they are rendering.
For instance, in After Effects, more memory means you can preview longer bits of HD video effects without fully rendering the scenes. So if you have 4GB, you might be able to preview only 6 to 8 seconds at a time; while with 32GB, you could preview 30 seconds of a full HD video.
Soule also says that Premiere has been particularly optimized to use multiple cores. In the Windows version, it can take multiple tasks and split them across cores; while on the Mac version, the program uses Grand Central to schedule the cores.
More after the jump.
In Photoshop, multicore and 64-bit support also speeds up a number of specific features dealing with Camera Raw features (where the files can be large) and for the impressive "content-aware fill" feature, which has gotten a lot of attention.
Both the photo and video products take advantage of GPU acceleration. Soule noted that Premiere Pro uses GPU accelerations for video decoding and also for more than 30 different effects, such as color correction, opacity, blur, chroma keying, etc. While this isn't required, it makes a big difference on the effects customers will "use day in and day out," he said.
These features specifically use Nvidia's CUDA architecture, which Soule said the company chose because it is farther along than the other platforms. The list of boards "recommended" for use with CS5 is heavily slated toward the professional Quadro line, though the GeForce 285 is also listed and it should really work on somewhat lesser boards.
After Effects uses the OpenGL framework for GPU acceleration, mostly for 3D compositing. This hasn't changed significantly from CS4.
Hughes said that Photoshop uses the GPU mainly for presenting additional content such as the "mixer brush," the HUD color picker,brush/clone preview, and so on. It's also used by the "Repoussé" feature in Paint, which extrudes objects to give them a 3D feel.
In addition, the GPU is being used to accelerate features such as Camera Raw and to enable you to view the image clearly at any view percentage. Again, you can use these tools without GPU acceleration, but it's a much smoother experience with the feature, and Hughes said this will work even with low-end discrete GPUs from either Nvidia or ATI.
Looking over the whole list of features that are enabled by more memory, multi-core support, and GPU acceleration, I'm struck by how some of the features seem pretty esoteric--but a lot seem likely to become very mainstream, such as working with larger HD video or scaling an image to any size you'd like. In many cases, you could implement these features without the new hardware, but the new hardware just makes the features fast enough so that actually you'd want to do it on a regular basis.
In an era where a lot of emphasis is placed on doing less on client computers and more on the servers, it's interesting to see the kind of features that today's more powerful desktops are enabling.
http://blogs.pcmag.com/miller/2010/04/how_adobe_cs5_takes_advantage.php
Set Up A Wii Internet Connection
If you have a Nintendo Wii Internet connection, it will allow you to play games with friends across the world, download games, update your system, send email to friends, and more. With these given steps you can easily set up your Nintendo Wii Internet connection without affecting PC Health.
You have to keep in mind that in order to set up your Nintendo Wii Internet connection, you need to have high speed Internet service, such as DSL, cable or fiber optic. But keep in mind that if you want to use a wired connection for your Wii, you have to purchase the Nintendo Wii LAN Adapter and a long ethernet cable to reach your router or modem.
You will find that the Wii LAN adapter is available from many sources for about $30 and the cable will cost you around $10 or more. Always remember that if you want to plug in your computer and Wii at the same time, you will need a router.
But you do not need a router if you are planning on unplugging your computer when you use Wii over the Internet. Most of the wireless routers will cost about $35 and do not require a cable, so it is better to purchase a wireless router instead.
Always remember that if you still want to use the Wii LAN adapter to connect to the Internet, you can follow these steps to connect your Wii LAN adapter to your Wii game system. At first just make sure that your Wii game system is turned off. Now just attach the Wii LAN adapter to the USB port on the back of your console. Try to connect the other end to an ethernet cable that goes to your router or modem. Now remember to turn your console back on.
Always keep in mind that if you are using the Nintendo Wii LAN Adapter to connect to the Internet, just try to follow these steps. Remember that if you are connecting to the Internet via a wireless router, skip this step and just go to step 3. Try to connect your Wii via a wired connection. Just go to your Wii menu. Click on your round Wii button on the lower left corner and click on Wii Settings. Just click on the right arrow to go to page 2. After this click on the Internet button and click connection settings and then click Connection 3. When you are done click wired connection. After this your Wii will do a connection test. Therefore you are now finished.
If you want to connect your Wii via a wireless connection, you have to at first go to the Wii Menu. Just try to click on the round Wii button on the lower left corner and click Wii Settings. Try to click on the right arrow to
go to page 2. And click on the Internet button. After this click your connection settings and click on connection 3. Click on the wireless connection. Just select the search option for Access Point and click OK. Try to select on the access point that you want to use. Remember to click on Save and OK. Now you may be prompted to enter your password. Now your Wii should now be all connected.
If you like to browse the Internet from your Wii, you need to purchase the Internet channel. These steps are also safe for your PC Health.
*Article Source:*
http://www.articlecity.com/articles/computers_and_internet/article_5237.shtml
You have to keep in mind that in order to set up your Nintendo Wii Internet connection, you need to have high speed Internet service, such as DSL, cable or fiber optic. But keep in mind that if you want to use a wired connection for your Wii, you have to purchase the Nintendo Wii LAN Adapter and a long ethernet cable to reach your router or modem.
You will find that the Wii LAN adapter is available from many sources for about $30 and the cable will cost you around $10 or more. Always remember that if you want to plug in your computer and Wii at the same time, you will need a router.
But you do not need a router if you are planning on unplugging your computer when you use Wii over the Internet. Most of the wireless routers will cost about $35 and do not require a cable, so it is better to purchase a wireless router instead.
Always remember that if you still want to use the Wii LAN adapter to connect to the Internet, you can follow these steps to connect your Wii LAN adapter to your Wii game system. At first just make sure that your Wii game system is turned off. Now just attach the Wii LAN adapter to the USB port on the back of your console. Try to connect the other end to an ethernet cable that goes to your router or modem. Now remember to turn your console back on.
Always keep in mind that if you are using the Nintendo Wii LAN Adapter to connect to the Internet, just try to follow these steps. Remember that if you are connecting to the Internet via a wireless router, skip this step and just go to step 3. Try to connect your Wii via a wired connection. Just go to your Wii menu. Click on your round Wii button on the lower left corner and click on Wii Settings. Just click on the right arrow to go to page 2. After this click on the Internet button and click connection settings and then click Connection 3. When you are done click wired connection. After this your Wii will do a connection test. Therefore you are now finished.
If you want to connect your Wii via a wireless connection, you have to at first go to the Wii Menu. Just try to click on the round Wii button on the lower left corner and click Wii Settings. Try to click on the right arrow to
go to page 2. And click on the Internet button. After this click your connection settings and click on connection 3. Click on the wireless connection. Just select the search option for Access Point and click OK. Try to select on the access point that you want to use. Remember to click on Save and OK. Now you may be prompted to enter your password. Now your Wii should now be all connected.
If you like to browse the Internet from your Wii, you need to purchase the Internet channel. These steps are also safe for your PC Health.
*Article Source:*
http://www.articlecity.com/articles/computers_and_internet/article_5237.shtml
Electronically Captured Data and the Competitive Edge It Gives Your Company
Are you spending too much time physically handling paper documents in your organization? Like most companies, you are flooded daily with the creation of documents, reports, proposals, stats sheets, as well as, countless documents which come to you every day.
Rather than physically handling each document and passing it along to the appropriate responsible party, there are document capture process systems in place today that eliminate the manually handling and recording of such documents. Welcome to the digital world.
By scanning your paper documents, you are able to view, archive, and retrieve your important data electronically with online images. It is the input of data, electronically captured, which affords many companies a competitive edge.
Most recognizable, and a very easy example to understand, is how a barcode reader at your supermarket checkout counter works. While recording your sale, it captures the inventory related data. Most likely, you may also be using a store shopping card, which identifies you as the person making the purchase. If your purchase is paid for using a credit card, then additional information is captured along with your purchase.
We take the above example of inventory capture, pretty much for granted now; it's been around for a long time. Now let's imagine the same level of efficiency with your every day documents.
Electronically captured data can be very beneficial to an organization for a number of reasons but the manipulation of the electronic data gives companies a competitive edge:
• Eliminates need for manual data entry from documents as the data is captured electronically and directly into the computer system
• Electronically stored documents make for easy archive and access from any desktop, anywhere in the world
• Distribution of documents is much easier electronically rather than physically
• Searchable text makes it easy to find the document(s) you are looking for
• Physical storage space is dramatically reduced for your document retention
• Security and access to sensitive data is controllable.
Not all documents are limited to black and white text. Most organizations will also need to deal with complex documents with color graphics. Some examples include: engineering specifications, criminal evidence, property descriptions and photographs, exhibits, charts, and drawings to just name a few.
By simple definition, data capture is the the collecting and entering of data in a computer, or the conversion of data into a form compatible with computers. A process is put into place when a company has a need to capture vast amounts of information from documents.
Also known as simply capture forms. A typical data capture form will have a fill-in-the-gaps format, often having boxes to enter details of company name, requisition number, etc. The data captured on the forms is then scanned or manually entered into a database. Here are some easily recognizable examples of data capture forms you have probable already used:
• Patient data from health service organizations
• Registration forms and feedback surveys from hotels
• Enrollment forms for schools, colleges, universities, churches
• Job application forms
• Customer application forms for banking
• Building and equipment maintenance records
• Safety forms
Often confused with optical character recognition (OCR), data capture is more complex and valuable to an organization. Unlike OCR, data capture software captures specific, targeted data, usually from a form, that is required to support a business process. OCR is just the basic conversion of any scanned alphanumeric information into a machine readable digital form.
While capturing data from structured forms is a fairly well-understood process, most companies have a great deal of 'unstructured' data to also consume. By unstructured, we mean relevant information that could be found almost anywhere on a page. Invoices would be a great example, as there is no common standard and each of your suppliers will have their own form. In the example of an invoice, not only are you interested in matching vendor information to your records but it would also be helpful to associate their invoice number to your purchase order.
Data capture services can be configured to the unique needs of your organization with the ultimate goal of improving your business processes. Typically solutions are offered on a single platform to capture data, whatever formats and wherever the needs are across your enterprise organization. Considering the mobility of your workforce, systems cater to input from any combination of paper, tablet PC, or web form. Systems today offer concurrent processing of hand-printed and handwritten forms, invoices, checks, correspondence, and any other document type, thus reducing your operating costs and increasing your productivity with a short payback.
*Article Source:*
http://www.articlecity.com/articles/computers_and_internet/article_5235.shtml
Rather than physically handling each document and passing it along to the appropriate responsible party, there are document capture process systems in place today that eliminate the manually handling and recording of such documents. Welcome to the digital world.
By scanning your paper documents, you are able to view, archive, and retrieve your important data electronically with online images. It is the input of data, electronically captured, which affords many companies a competitive edge.
Most recognizable, and a very easy example to understand, is how a barcode reader at your supermarket checkout counter works. While recording your sale, it captures the inventory related data. Most likely, you may also be using a store shopping card, which identifies you as the person making the purchase. If your purchase is paid for using a credit card, then additional information is captured along with your purchase.
We take the above example of inventory capture, pretty much for granted now; it's been around for a long time. Now let's imagine the same level of efficiency with your every day documents.
Electronically captured data can be very beneficial to an organization for a number of reasons but the manipulation of the electronic data gives companies a competitive edge:
• Eliminates need for manual data entry from documents as the data is captured electronically and directly into the computer system
• Electronically stored documents make for easy archive and access from any desktop, anywhere in the world
• Distribution of documents is much easier electronically rather than physically
• Searchable text makes it easy to find the document(s) you are looking for
• Physical storage space is dramatically reduced for your document retention
• Security and access to sensitive data is controllable.
Not all documents are limited to black and white text. Most organizations will also need to deal with complex documents with color graphics. Some examples include: engineering specifications, criminal evidence, property descriptions and photographs, exhibits, charts, and drawings to just name a few.
By simple definition, data capture is the the collecting and entering of data in a computer, or the conversion of data into a form compatible with computers. A process is put into place when a company has a need to capture vast amounts of information from documents.
Also known as simply capture forms. A typical data capture form will have a fill-in-the-gaps format, often having boxes to enter details of company name, requisition number, etc. The data captured on the forms is then scanned or manually entered into a database. Here are some easily recognizable examples of data capture forms you have probable already used:
• Patient data from health service organizations
• Registration forms and feedback surveys from hotels
• Enrollment forms for schools, colleges, universities, churches
• Job application forms
• Customer application forms for banking
• Building and equipment maintenance records
• Safety forms
Often confused with optical character recognition (OCR), data capture is more complex and valuable to an organization. Unlike OCR, data capture software captures specific, targeted data, usually from a form, that is required to support a business process. OCR is just the basic conversion of any scanned alphanumeric information into a machine readable digital form.
While capturing data from structured forms is a fairly well-understood process, most companies have a great deal of 'unstructured' data to also consume. By unstructured, we mean relevant information that could be found almost anywhere on a page. Invoices would be a great example, as there is no common standard and each of your suppliers will have their own form. In the example of an invoice, not only are you interested in matching vendor information to your records but it would also be helpful to associate their invoice number to your purchase order.
Data capture services can be configured to the unique needs of your organization with the ultimate goal of improving your business processes. Typically solutions are offered on a single platform to capture data, whatever formats and wherever the needs are across your enterprise organization. Considering the mobility of your workforce, systems cater to input from any combination of paper, tablet PC, or web form. Systems today offer concurrent processing of hand-printed and handwritten forms, invoices, checks, correspondence, and any other document type, thus reducing your operating costs and increasing your productivity with a short payback.
*Article Source:*
http://www.articlecity.com/articles/computers_and_internet/article_5235.shtml
Hard Disk Erasure - When Does Erased Not Really Mean Erased?
You have no doubt heard the stories about personal or confidential business data being found on computer hard disks. There are comments by various world renowned experts in data recovery and computer forensics who state that you cannot remove all of the data on a hard disk.
How can you know for sure whether it is true or not that others can access a so called erased hard drive and obtain information from it. Is it true that the deleted information is able to be retrieved through a hard disk data recovery expert? Can these hard drive data recovery experts find your personal or confidential information after you think you have exposed of it all?
First there are a few things to cover in the details of hard drive erasure and how you should go about it:
What does Hard Drive Erasure Entail?
The true data erasure is when a dedicated degaussing mechanism is used to "flip" all of the parts on a magnetic material so that no hint of the actual data remains so no data recovery is possible. It is worthwhile knowing that data erasure software does not actually erase the data, what it does is in fact replace the data with other data effectively over writing the information that you no longer wish to store.
Deleting a file from your hard disk drive actually doesn't, in most cases, do anything to the information itself. What it does is remove the instruction information that tells the system where the data is. In some cases a data erasure can actually leave all of the information on the hard disk and in fact just add a further entry in the hard disk advising that the file is deleted. To the untrained eye the information appears as if it is gone. Meanwhile the actual data is still there until a future point in time where the space that it is taking up is re-used by new data.
Sometimes data from files can also be stored in transient memory. A large portion of operating systems use caches, these are areas where the data that is being accessed is temporarily stored. The Windows swap-file is a good example of this type of system.
The difference with data erasure software is that it is designed to complete an ordered and thorough replacement of the information that was stored and therefore the original data no longer exists as it has been effectively written over with new data.
What is the Best Approach?
• Disk Erasure Software
Hard disks store data in sections named sectors. Usually each of these sectors is 512 bytes long. These sectors are all accessible for reading and writing via the hard drive interface (IDE, SATA, SCSI). What this means is that it is possible to replace the data in every sector and therefore remove the data.
However, not all of the data gets removed. There can be problems caused by sectors that become unusable during normal operation and a hard disk will maintain a set of spare sectors. That means that the 160GB hard disk drive is actually 160GB plus a few additional spare ones that you are unable to access. This means that if your drive has problems attempting to write to the disk the hard drive itself can reallocate to one of these spare sectors. When this reallocation occurs this information is recorded in a separate table that is known as the G-List, or Grown Defect List.
What this in effect means is that it is possible for a sector that you wrote data too could not be written to but could actually still be read. Of course to the normal operator this is not something that would be noticed but it
would be found easily by a hard disk data recovery expert. Data recovery experts know where to look for this kind of information and if these sectors do contain personal or confidential information they would be found. The chances that these spare sectors hold this information are of course low but
there is still a possibility.
A more common problem is that the actual data erasure process is not monitored. An employee who is erasing disks who does not complete the data erasure process to specific high standards may in fact skip some of the disks in a batch to reduce their workload or for various other reasons. There have been occasions where this has happened and the only way to know for sure if the disk has been erased correctly with the software is to conduct validation tests on the erased disks themselves.
This means that when you are protecting and erasing sensitive and confidential information you should use a reputable software program and business to carry out the requirements of the process. If the processes of the disk erasure are monitored and logged correctly then there should not be any problems. Therefore you should not rely on technology alone at the expense of sound practices.
• Degaussing
Degaussing is often considered the best approach and involves the placing of the actual hard drive into a moving magnetic field that is strong enough to realign the molecules and eradicate any data within the hard disk drive. It is believed that this method offers the best confirmation that the data has actually been removed.
However there are some factors that require consideration:
1. Degaussing does more than just remove your data. It also removes all of the information within the disk that is there from manufacture and when the drive was formatted. Therefore you can not recreate this particular information and the disk it self will no longer be operational and therefore can not be reused.
2. When you consider that the disk can no longer be used this also means that you can not confirm whether the data has in fact been completely erased. If there was a problem with the degaussing device or the correct procedures were not followed during the degaussing process then there is a possibility that the information was not completely erased. Worse case scenario is that the degaussing process did not work at and the disk was actually damaged prior to the degaussing process or during it.
Therefore, even with degaussing there is a possibility that all or some of your data remains and that there is some hard disk data recovery process that could retrieve the information.
How then do you Protect Your Sensitive Information?
The first step is to ensure that you have a process that is easy to follow and that the process is monitored correctly.
Second step ensure that you use reputable software for disk erasure to complete the process.
Third step, and this is where it is imperative that the information is erased 100%, you should use the services of a third party to test that the process has in fact worked.
With this information you now have a greater understanding of how you can erase your information, and the steps or processes to follow to ensure that the information is in fact erased. Professionals can assist you in the process and in the validation that your hard drive data recovery will not be possible.
*rticle Source:*
http://www.articlecity.com/articles/computers_and_internet/article_5234.shtml
How can you know for sure whether it is true or not that others can access a so called erased hard drive and obtain information from it. Is it true that the deleted information is able to be retrieved through a hard disk data recovery expert? Can these hard drive data recovery experts find your personal or confidential information after you think you have exposed of it all?
First there are a few things to cover in the details of hard drive erasure and how you should go about it:
What does Hard Drive Erasure Entail?
The true data erasure is when a dedicated degaussing mechanism is used to "flip" all of the parts on a magnetic material so that no hint of the actual data remains so no data recovery is possible. It is worthwhile knowing that data erasure software does not actually erase the data, what it does is in fact replace the data with other data effectively over writing the information that you no longer wish to store.
Deleting a file from your hard disk drive actually doesn't, in most cases, do anything to the information itself. What it does is remove the instruction information that tells the system where the data is. In some cases a data erasure can actually leave all of the information on the hard disk and in fact just add a further entry in the hard disk advising that the file is deleted. To the untrained eye the information appears as if it is gone. Meanwhile the actual data is still there until a future point in time where the space that it is taking up is re-used by new data.
Sometimes data from files can also be stored in transient memory. A large portion of operating systems use caches, these are areas where the data that is being accessed is temporarily stored. The Windows swap-file is a good example of this type of system.
The difference with data erasure software is that it is designed to complete an ordered and thorough replacement of the information that was stored and therefore the original data no longer exists as it has been effectively written over with new data.
What is the Best Approach?
• Disk Erasure Software
Hard disks store data in sections named sectors. Usually each of these sectors is 512 bytes long. These sectors are all accessible for reading and writing via the hard drive interface (IDE, SATA, SCSI). What this means is that it is possible to replace the data in every sector and therefore remove the data.
However, not all of the data gets removed. There can be problems caused by sectors that become unusable during normal operation and a hard disk will maintain a set of spare sectors. That means that the 160GB hard disk drive is actually 160GB plus a few additional spare ones that you are unable to access. This means that if your drive has problems attempting to write to the disk the hard drive itself can reallocate to one of these spare sectors. When this reallocation occurs this information is recorded in a separate table that is known as the G-List, or Grown Defect List.
What this in effect means is that it is possible for a sector that you wrote data too could not be written to but could actually still be read. Of course to the normal operator this is not something that would be noticed but it
would be found easily by a hard disk data recovery expert. Data recovery experts know where to look for this kind of information and if these sectors do contain personal or confidential information they would be found. The chances that these spare sectors hold this information are of course low but
there is still a possibility.
A more common problem is that the actual data erasure process is not monitored. An employee who is erasing disks who does not complete the data erasure process to specific high standards may in fact skip some of the disks in a batch to reduce their workload or for various other reasons. There have been occasions where this has happened and the only way to know for sure if the disk has been erased correctly with the software is to conduct validation tests on the erased disks themselves.
This means that when you are protecting and erasing sensitive and confidential information you should use a reputable software program and business to carry out the requirements of the process. If the processes of the disk erasure are monitored and logged correctly then there should not be any problems. Therefore you should not rely on technology alone at the expense of sound practices.
• Degaussing
Degaussing is often considered the best approach and involves the placing of the actual hard drive into a moving magnetic field that is strong enough to realign the molecules and eradicate any data within the hard disk drive. It is believed that this method offers the best confirmation that the data has actually been removed.
However there are some factors that require consideration:
1. Degaussing does more than just remove your data. It also removes all of the information within the disk that is there from manufacture and when the drive was formatted. Therefore you can not recreate this particular information and the disk it self will no longer be operational and therefore can not be reused.
2. When you consider that the disk can no longer be used this also means that you can not confirm whether the data has in fact been completely erased. If there was a problem with the degaussing device or the correct procedures were not followed during the degaussing process then there is a possibility that the information was not completely erased. Worse case scenario is that the degaussing process did not work at and the disk was actually damaged prior to the degaussing process or during it.
Therefore, even with degaussing there is a possibility that all or some of your data remains and that there is some hard disk data recovery process that could retrieve the information.
How then do you Protect Your Sensitive Information?
The first step is to ensure that you have a process that is easy to follow and that the process is monitored correctly.
Second step ensure that you use reputable software for disk erasure to complete the process.
Third step, and this is where it is imperative that the information is erased 100%, you should use the services of a third party to test that the process has in fact worked.
With this information you now have a greater understanding of how you can erase your information, and the steps or processes to follow to ensure that the information is in fact erased. Professionals can assist you in the process and in the validation that your hard drive data recovery will not be possible.
*rticle Source:*
http://www.articlecity.com/articles/computers_and_internet/article_5234.shtml
Subscribe to:
Posts (Atom)