April 28, 2011

Online virus scanning websites

Awesome Free Anti-Virus Scanning Websites

    It’s highly likely that you’ve had some sort of experience with a computer virus in the past. If not, then lucky you – but you can never be too safe, especially if you’re running Windows
     Online free anti virus scan apps have been around for a while, and whilst they’re no match for standalone software they certainly have their uses. Perhaps you’re on an unfamiliar PC that’s acting a little strange? Or maybe your existing software has been disabled, and you’ve frantically restarted in Safe Mode looking for a solution.
     Below you will find 4 websites to check and verify that your PC is virus free, and 3 to upload and check individual files to help prevent an outbreak. Let the scanning begin!



      This free scanner will work in all major browsers, and requires a quick addon to be installed before you can scan. Simply visit the site, click Scan Now, agree to the installation and accept the EULA.



     Your PC will then be scanned in record time to let you know whether or not you’ve got any nasty viruses, trojans or other malware hiding in your PC’s memory. It won’t scan your whole hard drive, but if your PC is acting up and you suspect malicious software is to blame, QuickScan should find it.
(click here for BitDefender)

Panda ActiveScan  

Unfortunately ActiveScan will only work with Internet Explorer or Firefox, although Panda recommends you install the IE Tab Classic extension for compatability if you’re running Chrome.

     For a quick scan of running processes choose Quick Scan or if you’d prefer to delve a little deeper you can opt for a Full Scan. Once you’ve chosen click Scan now and you’ll be prompted to download either an extension (if you’re running Firefox) or an ActiveX control (if Internet Explorer’s your thing).

     The scanner will update its definitions and then run the scan of your choice before delivering the good or bad news.(Click Here for PandaActivscan)

TrendMicro Housecall

Housecall is completely browser independent, which means you can access it from any web browser. It achieves this by packaging the scanner into a small executable file which when run scans your PC for any signs of malware.

     There are two versions to choose from – 32bit and 64bit – and you should make your choice based on your operating system. In case you’re wondering what version you’re running, open Control Panel in your Start menu and choose System. Once you’ve downloaded the file, run it and the definitions will be updated for you.


     After you’ve accepted the EULA click Scan Now to see what’s lurking on your PC.
(Click Here for TrendMicroHouseCell)


Utilising the Java platform to check your PC for nasties, F-Secure should run in any browser provided you’ve got Java installed and JavaScript enabled. To launch the scanner you must accept the license terms by checking the box and then click Run Check.
     You’ll need to authorise the Java applet to run before the scanner will launch in a separate window. You’re then free to choose between Quick Scan, Full Scan and a customized My Scan (where you choose which bits of your hard drive to check).


     Once you’ve chosen the scanner will update its definitions (it’ll take a few minutes, but stick with it) and your PC will be checked for problems. (Click Here for F-secure)

Individual File Scanners

VirScan

The VirScan service allows you to upload a file (up to 20MB) and check it against more than 30 other sets of definitions from the web’s finest anti-virus solutions.


   You can upload .ZIP and .RAR files with a maximum of 20 compressed items, and even give the archive a password of “infected” or “virus”. Simply click Choose File followed by Upload and your file will be scanned, showing you the results in your browser. (Click Here for VirusScan)

VirusTotal

With support for both file upload and URL checking VirusTotal is a popular online virus scanner (so check the server load before you submit). Not only can you upload via the web form on the homepage, but you can email your files (again, 20MB maximum filesize) to scan@virustotal.com with “SCAN” in the subject field.


    You will then receive your results via email once your scan has been complete. Much like VirScan, VirusTotal uses a database of definitions assembled from all over the web. (click Here for VirusTotal)


Jotti

    Operating much in the same way as the previous two engines, Jotti allows you to upload a file of 20MB or less for submission to a selection of the web’s anti-virus engines.

(Click Here for JottiVirusScan)



 



3 Computer Security Tips You Must Obey!


3 Computer Security Tips You Must Obey!


         As a computer user you should always do your best to learn and implement the latest security tips because it is now easier to hack a computer than it has ever been. Computer hackers are now becoming more sophisticated that they easily come up with new hacking tools very often; what matters most isn’t the attempt people make to hack your computer but what you do to ensure they never succeed. There are a lot of things you should implement on your computer if you truly want security for it and this post will be giving you some computer security tips you should always implement.


      Since a lot of us spend more time online compared to the time we spend offline I think this tip is even more important. A lot of people now regularly visit warez sites and forums and they download any file from these sites and from email attachments from people they don’t know and then install it on their computer. This is really dangerous and you will be making a great mistake that can cost you all the files on your computer if you keep on doing this. Don’t download any software you don’t really need and be careful with where you download from; I once had a problem of this nature before when I once downloaded a software (from a legitimate site) that I have no need for, unknown to me a virus has been programmed into this software and my computer got infected and started opening sites I didn’t ask it to, I also noticed an unusual usage on my bandwidth and I was able to trace it back to this software.
Don’t just install any software on your computer but ensure you only install software you really need and only from a provider you really trust.

Have the Latest Antivirus Software Installed

Another thing you should do to make sure your computer is really secure is to download and install the latest antivirus software on your computer. You should also make sure you allow your antivirus software to always update its database automatically as this will fix bugs that might prevent it from detecting some viruses and it will make it more potent and effective.
You should also make sure you NEVER disable your antivirus no matter what. If a software program you’re trying to install is recommending you disable your antivirus then you should make sure you don’t install it – in most cases software like this are viruses, spyware and adware and the only way to prevent them is making sure your antivirus system is intact and always active.

Uninstall Outdated Software You No Longer Use

   There is a saying that bad communication corrupt good manners; this saying is also true as far as computer security is concerned and only one old and outdated software can be the gateway to your computer’s destruction. As you can’t have an old wine in a new bottle most outdated software are also highly unstable and they often cause system crashes. Another disadvantage of outdated software is that they can also make it easy for hackers to get into your computer by exploiting them.


April 13, 2011

NFC: Near Field Communication

What is NFC?


      Near Field Communication (NFC) technology makes life easier and more convenient for consumers around the world by making it simpler to make transactions, exchange digital content, and connect electronic devices with a touch.
  

     A standards-based connectivity technology, NFC harmonizes today's diverse contactless technologies, enabling current and future solutions in areas such as:
  • Access control
  • Consumer electronics
  • Healthcare
  • Information collection and exchange
  • Loyalty and coupons
  • Payments
  • Transport

Key Benefits of NFC

NFC provides a range of benefits to consumers and businesses, such as:
  • Intuitive: NFC interactions require no more than a simple touch
  • Versatile: NFC is ideally suited to the broadest range of industries, environments, and uses
  • Open and standards-based: The underlying layers of NFC technology follow universally implemented ISO, ECMA, and ETSI standards
  • Technology-enabling: NFC facilitates fast and simple setup of wireless technologies, such as Bluetooth, Wi-Fi, etc.)
  • Inherently secure: NFC transmissions are short range (from a touch to a few centimeters)
  • Interoperable: NFC works with existing contactless card technologies
  • Security-ready: NFC has built-in capabilities to support secure applications

NFC as a Business Driver

         NFC was developed to address the contactless standards dilemma. NFC is a technology standard that harmonizes and extends existing contactless standards. NFC technology is supported by the world's leading consumer electronics (CE) and mobile device manufacturers, semiconductor producers, network operators, developers, service companies, and financial institutions.
            NFC enables these organizations to invest in one technology that supports leading global contactless technologies and applications. By integrating NFC, devices can support and interoperate with existing contactless card applications and infrastructures such as access control, payment, and transport.
It also introduces innovative new features that are only possible with the union of contactless technology and CE devices.

NFC and Contactless Technologies

        NFC complements many popular consumer level wireless technologies, by utilizing the key elements in existing standards for contactless card technology (ISO/IEC 14443 A&B and JIS-X 6319-4). NFC can be compatible with existing contactless card infrastructure and enables a consumer to utilize one device across different systems.
          Extending the ability of the contactless card technology, NFC also enables devices to share information at a distance less than 4 centimeters with a maximum communication speed of 424kbps. Users can share business cards, make transactions, access information from smart posters or provide credentials for access control systems with a simple touch.
         NFC’s bidirectional communication ability is ideal for establishing connections with other technologies by the simplicity of touch. For example if the user wants to connect their mobile device to their stereo to play media, they can simply touch the device to the stereo’s NFC touch point and the devices will negotiate the best wireless technology to use.
What does this mean for the end user? Easy connections, quick transactions, and simple data sharing.

NFC as Technology Enabler

      NFC creates a new and universal interface to existing devices through simple touch interaction. NFC bridges gaps between existing technologies and devices to enable new applications/services (enabling connections from real to virtual, connections to physical/real world).

NFC Means Proximity

   All NFC transactions take place within a very small area, anywhere from a touch to 4 centimeters. This means that you can't unknowingly purchase something because you walk next to a smart poster.

NFC Enables One-Touch Setup of Wi-Fi and Bluetooth

       NFC is able to replace the pairing of Bluetooth-enabled devices, or the configuration of a Wi-Fi network through PINs and keys, by simply touching the two devices to be paired or connected to the network, or by touching the device to a tag. The gain in simplicity of use is substantial while the level of confidence is exactly similar.

NFC Enables Electronic Door Locks

   For doorlocks that are equipped with an actuator and a short range contactless reader, a simple upgrade may allow NFC devices to substitute for contactless cards. Advantages, for example in hospitality, are the possibility to remotely send the access rights in advance to the user's handset, and the coupling with other applications such as booking, and skipping the check-in phase. In the example of access control, one can centrally manage the rights in real time without physical delivery of cards.

NFC and Healthcare

      Personal health monitors recording a human’s vital data can be read by an NFC reader/writer, which for example might be a persons mobile phone, by simply touching the reader to the health device. The physical proximity that NFC requires guarantees the operator has the right understanding of which data is read at what time, thus greatly reducing the chance of a human error and, by the simplicity of instructions, allows patients of every age to monitor their health status autonomously.

          And once a standardized format and secure storage for medical records and history is available, as well as generally accepted procedures to access these data, NFC will be a natural way to interact between a portable device held by the user and a medical system.

NFC Devices Enable Data Exchange

     NFC enables users to quickly and easily transfer information between devices with a simple touch. Whether it be an exchange of business cards, a quick transaction, or downloading a coupon, the proximity ensures that the information shared is the information you want to share.

NFC and Interoperability

      NFC represents a converging evolution of existing contactless standards toward the goal of global interoperability. The NFC Forum takes both a structural and a pragmatic approach to give maximum assurance that this goal can be met.

        Structurally, NFC Forum specifications are based on existing and recognized standards like ISO/IEC 18092 and ISO/IEC 14443-2,3,4, as well as JIS X6319-4. They are implementation specifications that describe the parts of those standards that are relevant for NFC Forum devices. Therefore, compliant devices behave in the most consistent way, and the evolution of existing infrastructure toward full NFC is facilitated.

     The Certification Program, which checks devices for compliance with NFC Forum specifications, is being launched in waves as NFC Forum specifications evolve. Currently, certification includes testing for the lower-level digital protocols, specifically the Tag Operation specifications for the different tag types, the NFC Digital Protocol Specification, and the NFC Activity Specification. Moving forward, certification will also include testing for the physical layer ("NFC RF Analogue Technical Specification") and selected upper-level digital protocols ("NFC Logical Link Control Protocol (LLCP) Technical Specification" and "NFC Simple NDEF Exchange Protoco (SNPE) Technical Specification").


       Pragmatically, the NFC Forum offers its members the opportunity to participate in PlugFest events, held throughout the year, where NFC solution providers can anonymously test the interoperability of their products with other NFC products through hands-on experiments. This process can be applied to certified devices as well as equipment and software that has not been certified.

For more detail on NFC (Near field communication) click Here



April 06, 2011

Apple Magic Mouse review


We’ve built a better mouse
      It began with iPhone. Then came iPod touch. Then MacBook Pro. Intuitive, smart, dynamic. Multi-Touch technology introduced a remarkably better way to interact with your portable devices — all using gestures. Now we’ve reached another milestone by bringing gestures to the desktop with a mouse that’s unlike anything ever before. It's called Magic Mouse. It's the world's first Multi-Touch mouse. And while it comes standard with every new iMac, you can also add it to any Mac with Bluetooth wireless technology for a Multi-Touch makeover.

 

Seamless Multi-Touch Surface

     Magic Mouse — with its low-profile design and seamless top shell — is so sleek and dramatically different, it brings a whole new feel to the way you get around on your Mac. You can’t help but marvel at its smooth, buttonless appearance. Then you touch it and instantly appreciate how good it feels in your hand. But it’s when you start using Magic Mouse that everything comes together.

    The Multi-Touch area covers the top surface of Magic Mouse, and the mouse itself is the button. Scroll in any direction with one finger, swipe through web pages and photos with two, and click and double-click anywhere. Inside Magic Mouse is a chip that tells it exactly what you want to do. Which means Magic Mouse won’t confuse a scroll with a swipe. It even knows when you’re just resting your hand on it.

Laser-Tracking Engine

Magic Mouse uses powerful laser tracking that’s far more sensitive and responsive on more surfaces than traditional optical tracking. That means it tracks with precision on nearly every surface — whether it’s a table at your favorite cafe or the desk in your home office — without the need for a mousepad.

Wireless

Bluetooth Icon     Magic Mouse connects to your Mac via Bluetooth wireless technology, so there’s no wire or separate adapter to worry about. Pair Magic Mouse with your Mac and enjoy a reliable and secure connection up to 33 feet away. When you combine Magic Mouse with the Apple Wireless Keyboard, you create a workspace free of annoying cables.
And because Magic Mouse is wireless, it can venture beyond the confines of your desk. A quick flick of the on/off switch helps conserve battery power while Magic Mouse is tucked in your bag. Even when it’s on, Magic Mouse manages power efficiently, by detecting periods of inactivity automatically.

Make one great gesture after another.

     Multi-Touch technology on the iPhone and iPod touch introduced a breakthrough way to interact with your content. Magic Mouse, with its Multi-Touch surface, does the same thing for your Mac. When you use gestures, it’s as if you’re touching what’s on your screen. For instance, swiping through web pages in Safari gives you the feeling of flicking through pages in a magazine. And scrolling with Magic Mouse isn’t your everyday scrolling. It supports momentum scrolling (similar to iPhone and iPod touch), where the scrolling speed is dictated by how fast or slowly you perform the gesture.

More charges. Less waste.

The Apple Battery Charger has one of the lowest standby power usage values — or "vampire draw" — of similar chargers on the market.1 That's the energy most chargers continue to draw after their batteries are fully charged. But the Apple Battery Charger senses when its batteries are done charging and automatically reduces the amount of power it needs. In addition, the reusable batteries that come with each Apple Battery Charger are designed to maintain a high charge capacity for hundreds of charges, so you no longer have to buy new batteries or toss them every few months.
More detail of charger click here



  • Click

    Magic Mouse is an advanced point-and-click mouse that lets you click and double-click anywhere on its Multi-Touch surface.
  • Two-button click

    Magic Mouse functions as a two-button mouse when you enable Secondary Click in System Preferences. Left-handed users can reassign left and right click, as well.
  • 360° scroll

    Brush one finger along the Multi-Touch surface to scroll in any direction and to pan a full 360 degrees.
  • Screen zoom

    Hold down the Control key on your keyboard and scroll with one finger on Magic Mouse to enlarge items on your screen.
  • Two-finger swipe

    Using two fingers, swipe left and right along the Multi-Touch surface to advance through pages in Safari or browse photos in iPhoto.
Gestures List

Give it your personal touch.
Maybe you want scrolling but don’t want swiping. Or two-button clicking instead of one. Whatever the case, Magic Mouse works the way you want it to work. All you do is go to the Magic Mouse preference pane in System Preferences to enable or disable features.
The ambidextrous design of Magic Mouse means it fits comfortably in your right hand if you’re a righty or in your left hand if you’re a lefty. And left-handers can easily swap left and right button functionality using System Preferences.

System Requirements

  • Mac computer with Bluetooth wireless technology
  • Mac OS X v10.5.8 or later with Wireless Mouse Software Update 1.0* or Mac OS X v10.6.1 or later with Wireless Mouse Software Update 1.0
  • Existing keyboard and mouse for setup
  • Two AA batteries (included)
For More detail on this article Click here

Images of Magic Mouse  Click here