Thursday, 20 September 2012

‘Linux: A Virus-Free OS’ – Truth or Myth ?



Linux the term is altogether an alien word for many people. And of the handful of people switching or let’s say having their ‘tryst’ with Linux, have a very common misconception – ‘Linux is virus free.’ A very debatable sentence, lets take a look at some arguments.
For getting to our point lets take a look at how a linux system works. Linux works in a multi-user environment, where users are given privileges of different magnitude for different purposes. A typical user would have normal privileges, simple enough to help him use the system but not change major system settings.
To spread a virus around you’ll have to gain access to the core of a linux system and for that you’ll need to have root access.
Linux is centered around security and gaining root access is nearly impossible. But, as they say, impossible is nothing. Viruses for linux  are on the rise. One of the major reasons is due to the fact that linux is being spread and marketed at quite a fast rate.
To accommodate novice users, GUI’s are being integrated. And this is one of the causes of rise in viruses. How? The following is a quote from a foobar blog post:
Then you save an email attachment under Linux, the execute flag is normally NOT set and thus, the file can’t be executed just by clicking on it. So, no luck?
Not so fast. Modern desktop environments, such as Gnome and KDE, conveniently offer a nice “workaround” called ‘launchers’. Those are small files that describe how something should be started. Just a few lines that specify the name, the icon that should be displayed and the actual command to execute. Conveniently, the syntax of those launcher files is the same for Gnome and KDE. And those launchers don’t have to have any execute permissions set on them! Desktop environments treat those files as a special case, so when you click on them Gnome or KDE will happily execute the command that was specified within the launcher description and without the need for the execute bit to be set on the launcher itself. Now we are getting somewhere!
But don’t jump the gun yet. Most of the linux distros are still way safer than Windows systems. The reason being that as they are open source and have full disclosure, developers are quick to release patches/fixes.
Also the reason why Linux viruses are rare, is because of the simple fact that the world has too muchWindows Users. So if a hacker could write a code and hack (for eg.) 60% of the world’s computers (as they are Windows-based systems) instead of only a handful of Linux computers, what would he choose?
Read More

The 10 Best Free Anti-Virus Programs


There are many free anti-virus programs on the market, and you want to sort the wheat from the chaff. Fair enough. Documented here are the 10 best antivirus programs on the market.

Microsoft Security Essentials
10 best antivirus programs
Released by Microsoft in late 2009, Microsoft Security Essentials sports more than a typically verbose Microsoft name: it’s also a really good antivirus. Lightweight enough to run on older machines without crippling their performance, yet competent enough to handle most viruses and malware out there.
Perhaps the best part of MSE is its simplicity. As you can see, the user interface is really clear, with large buttons for the most basic functions. This is important if you’re setting it up on a computer for someone who is not computer-savvy.
Finally, MSE is completely free – there’s no professional version you can upgrade to. In fact, it’s even permissible to use in business situations, meaning you can use it at work without breaking the law. This alone sets it above most of the other selections for the 10 best antivirus programs.

AVG Free

This one recently topped our Movers and Shakers list of the top downloaded free anti-virus programs. But just because AVG is popular doesn’t mean it’s not great.
AVG has become synonymous with free anti-virus, and there’s a reason for this: AVG offers complete malware protection, with considerably less bloat than the top pay-to-use antivirus clients. And while AVG Free does constantly remind you that you could pay for the professional version of the program, it does this without ever getting in the way of the program’s core purpose: protecting you from viruses.
10 best antivirus programs
Though when it comes to upgrading one version of AVG to another, you need to make sure you’re good at reading what’s on screen, because the free download is only available via a tiny link at the bottom of the screen””the site really wants you to get the paid version. When upgrading to version 9 recently, for example, check out how hidden the free download was:

Not exactly a big link, is it? Figure this minor inconvenience out, however, and AVG is a a really good free anti-virus. Download AVG.

Avira Free

free antivirus programs
In terms of simplicity, Avira’s right up there with MSE. It’s fairly lightweight, too, so the comparison is quite apt. While Avira does have a paid professional version to peddle, much like AVG, it’s not quite as aggressive as AVG in peddling it. I’d say Avira is solid and worth looking into for sure. Download Avira Free here.

Avast! Free

If this competition were for the coolest name, the piratey Avast! would win hands down. Even though that’s not what we’re discussing, Avast! stands up pretty well. This is one of the top free anti-viruses on the market, and for good reason: it’s remarkably complete. Expect great all-around protection, including against trojans and spyware. You can also expect constant reminders that there’s a free version you can upgrade to, on your desktop and in your inbox. Still, the protection is solid.

Malwarebytes

free antivirus programs
Whatever your default anti-virus is, you need Malwarebytes too. This program doesn’t run in your system background and constantly protect you, but when you run into a problem running Malwarebytes will usually take care of what other programs can’t. I’ve saved more than a few unbootable systems by running Malwarebytes from safe mode. This program takes care of any form of malware you throw at it, so keep it around. In fact, I’d keep this one on your flash drive in case you ever need to fix a computer for a friend (and if you’re reading this blog, you probably will).

Combo Fix

Consider this the nuclear option. If you know you’ve got a virus, but your usual anti-virus program can’t handle it, and Malwarebytes can’t handle it, it’s time for ComboFix. This program isn’t friendly: it runs from a command window and is proud of it.  And this is not a program you should use if you don’t know what you’re doing, because it can have devastating effects in the hands of the uneducated. But when all else fails, ComboFix delivers. Every geek should have this one on their keychain.

Clamwin

free antivirus programs
Clamwin is the Windows version of ClamAV, the main Linux anti-virus on the market. ClamWin is flawed in many ways: it simply scans instead of offering real-time protection, it doesn’t really do non-virus malware and it’s not exactly easy to use. Still, having ClamWin around doesn’t cost anything, and you can never have enough scanning tools in your arsenal.
Download ClamWin and see if you like it.

Panda Cloud AntiVirus

totally free antivirus programs
At first I thought the idea of a cloud-based antivirus was stupid, because it would only work while I’m online. Then it occurred to me: why the heck do I need an anti-virus when I’m offline?
As the name suggests, Panda Cloud Antivirus stores its virus definitions online. There’s an upside to this: your definitions are always up to date. There’s a downside, too, however: your anti-virus is constantly making use of your network connection.
I’d say this is a really good idea for underpowered PCs with constant access to the net. Like, say, a netbook. But if you’ve got a netbook you shouldn’t be using Windows anyway; switch to Jolicloud and you’ll have a functional netbook operating system immune to practically every virus.
Read a previously published article on Panda Cloud. Then download Panda Cloud Antivirus if you’re interested.

Comodo Firewall + Antivirus

Comodo is best known for its free firewall, but it also offers a bundled firewall and antivirus program. While the Comodo firewall isn’t the easiest to use, and the antivirus doesn’t include protection for non-virus forms of  malware, this one’s worth mentioning if you’re looking for a free security suite which includes both a firewall and anti-virus protection.
totally free antivirus programs

Common Sense 2012

This one’s unusual in that it’s free and considered by far the best protection out there, yet can’t be downloaded anywhere. Without it, however, even the best security software is rendered useless.
If you haven’t already figured this out, Common Sense 2012 isn’t a product you can download so much as it is a state of mind. If you’re going to be free of viruses and malware you need to use your head while browsing the web. The most important thing to remember is this: if something sounds too good to be true, it probably is””and your computer will probably be compromised.
Free porn usually isn’t. Warez are best to be avoided altogether. Nigerians that need your help transferring money are never actually princes or princesses. You get the idea: avoid shady sites online and you’ll find you’ll get far less malware on your machine.

Conclusion

There are a lot of great free anti-virus programs out there, but what you use is mostly a matter of preference. Myself, I use Microsoft Security Essentials on my Windows machine because it’s free, lightweight and will never ask me for money. But I also make sure I always have Malwarebytes on my thumb drive for quickly removing viruses and malware from the computers of friends and family.
What about you? Which free anti-virus do you prefer? Commenting is good for you, so do so!

Read More

Wednesday, 23 November 2011

How to configure Gmail With Microsoft outlook Express Step by Step

Outlook Express is easily the most popular Windows e-mail program. One reason for its popularity, of course, is that it is built into every Windows operating system. Outlook Express is easy to use and easy to upgrade.
Enabling POP
You can retrieve your Gmail messages with a client or device that supports POP, like Microsoft Outlook or Netscape Mail.
To enable POP in Gmail:
  • Sign in to Gmail.
  • Click Settings at the top of any Gmail page.
Click Forwarding and POP/IMAP


  • Select Enable POP for all mail or Enable POP for mail that arrives from now on.
  • Choose the action you'd like your Gmail messages to take after they are accessed with POP.
Configure your POP client* and click Save Changes
To set up your Outlook Express client to work with Gmail:
  • Open Outlook or Outlook Express.
  • Click the Tools menu, and select Accounts...
  • Click Add and then click Mail...

  • Enter your name in the Display name: field, and click Next.
  • Enter your full Gmail email address (username@gmail.com) in the Email address: field, and click Next.

Enter pop.gmail.com in the Incoming mail (POP3, IMAP or HTTP) server: field. Enter smtp.gmail.com in the Outgoing mail (SMTP) server: field.

  • Click Next.
  • Enter your Gmail username (including '@gmail.com') in the Account name: field. Enter your Gmail password in the Password field:, and click Next


  • Click Finish.
  • Highlight pop.gmail.com under Account, and click Properties.
  • Click the Advanced tab.
  • Fill in the following information:
1. Check the box next to This server requires a secure connection (SSL) under Outgoing Mail (SMTP).
2. Enter 465 in the Outgoing mail (SMTP): field.
3. Under Outgoing Mail (SMTP), check the box next to this server requires a secure connection (SSL).
4. Under Incoming mail (POP3), check the box next to this server requires a secure connection (SSL). The port will change to 995.
Return to the Servers tab, and check the box next to My server requires authentication.
Click
OK.
Congratulations! You're done configuring your client to send and retrieve Gmail messages.
Read More

What is Cloud Computing & How it works ?

Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network (typically the Internet).



Layers
Once an internet protocol connection is established among several computers, it is possible to share services within any one of the following layers.


Client
A cloud client consists of computer hardware and/or computer software that relies on cloud computing for application delivery and that is in essence useless without it. Examples include some computers, phones and other devices, operating systems, and browsers.
Application
Cloud application services or "Software as a Service (SaaS)" deliver software as a service over the Internet, eliminating the need to install and run the application on the customer's own computers and simplifying maintenance and support.
Platform
Cloud platform services, also known as platform as a service (PaaS), deliver a computing platform and/or solution stack as a service, often consuming cloud infrastructure and sustaining cloud applications. It facilitates deployment of applications without the cost and complexity of buying and managing the underlying hardware and software layers. Cloud computing is becoming a major change in our industry, and one of the most important parts of this change is the shift of cloud platforms. Platforms let developers write certain applications that can run in the cloud, or even use services provided by the cloud. There are different names being used for platforms which can include the on-demand platform, or Cloud 9. It's your choice on what you would like to call the platform, but they all have great potential in developing. When development teams create applications for the cloud, they must build its own cloud platform.
Infrastructure
Cloud infrastructure services, also known as "infrastructure as a service" (IaaS), deliver computer infrastructure – typically a platform virtualization environment – as a service, along with raw (block) storage and networking. Rather than purchasing servers, software, data-center space or network equipment, clients instead buy those resources as a fully outsourced service. Suppliers typically bill such services on a utility computing basis; the amount of resources consumed (and therefore the cost) will typically reflect the level of activity.
Server
The servers layer consists of computer hardware and/or computer software products that are specifically designed for the delivery of cloud services, including multi-core processors, cloud-specific operating systems and combined offerings.

Deployment modelsCloud computing types

Public cloud

Public cloud describes cloud computing in the traditional mainstream sense, whereby resources are dynamically provisioned to the general public on a fine-grained, self-service basis over the Internet, via web applications/web services, from an off-site third-party provider who bills on a fine-grained utility computing basis.

Community cloud

Community cloud shares infrastructure between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. The costs are spread over fewer users than a public cloud (but more than a private cloud), so only some of the benefits of cloud computing are realized.

Hybrid cloud

Hybrid cloud is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. It can also be defined as multiple cloud systems that are connected in a way that allows programs and data to be moved easily from one deployment system to another.

Private cloud

Private cloud is infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally.
They have attracted criticism because users "still have to buy, build, and manage them" and thus do not benefit from lower up-front capital costs and less hands-on management, essentially "[lacking] the economic model that makes cloud computing such an intriguing concept".


Architecture

Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically involves multiple cloud components communicating with each other over a loose coupling mechanism such as a messaging queue.

The Intercloud

The Intercloud is an interconnected global "cloud of clouds" and an extension of the Internet "network of networks" on which it is based.

Cloud engineering

Cloud engineering is the application of engineering disciplines to cloud computing. It brings a systematic approach to the high level concerns of commercialization, standardization, and governance in conceiving, developing, operating and maintaining cloud computing systems. It is a multidisciplinary method encompassing contributions from diverse areas such as systems, software, web, performance, information, security, platform, risk, and quality engineering.

Read More

Monday, 21 November 2011

How to Know if Your Computer is Infected with a Virus



No one wants to own a computer infected with a nasty virus. That's why it's very important to practice safe computing habits and to install reliable anti-virus software. You can avoid most malware just by paying attention and staying away from a few common traps. If your anti-virus software is up to date, you should be in pretty good shape.

But once in a while, computer viruses get beyond our defenses. Maybe our anti-virus software is out of date or has been compromised by a particularly clever bit of code. Perhaps we clicked on a link by accident and activated a virus. Or someone else used our computer and downloaded some malware by mistake.

Signs of a Computer Virus

Assuming your anti-virus software hasn't alerted you to the presence of a virus, here are some indicators of malware on your computer:

If your computer has become unstable, that's a sign that something's wrong. Some malware messes with important files that keep your computer running properly. That could cause your computer to crash. If your computer crashes when you try to run a specific application or open a particular file, that tells you that something has corrupted the data. It could be malware.

Does your computer seem to run much more slowly than it used to? This could be the result of malware as the malicious code begins to drain your computer's processing resources. If you aren't running a resource-heavy application but your computer is very slow, you might have a computer virus.

Strange messages indicating that you can't access certain drives on your computer are another sign that something is wrong. In a similar vein, applications that won't run or files that won't open may also be the result of infection. Other indicators include hardware (like printers) that no longer respond to commands. While none of these guarantee the presence of a virus, they do suggest that something is wrong with your machine.

If you notice that file sizes are fluctuating even if you aren't accessing those files, that's another sign of a computer virus. And finally, if you access menus and their appearance is odd or distorted, you could be the victim of a malware attack.
Read More

Friday, 18 November 2011

How Computer Addiction Works



Obsessively checking e-mail. Playing online games for 12 hours or more at a time. Placing more value on chat-room friends than real friends. Neglecting family, work and even personal health and hygiene. These are all symptoms of a new form of addiction that has surfaced only in recent years: computer addiction. In this article, we'll learn about computer addiction, why it's a problem -- and why some doctors disagree about whether it exists at all.Creating a single definition for computer addiction is difficult because the term actually covers a wide spectrum of addictions. Few people are literally addicted to a computer as a physical object. They become addicted to activities performed on a computer, like instant messaging, viewing Internet pornography, playing video games, checking e-mail and reading news articles. These activities are collectively referred to as Computer Mediated Communication(CMC). Computer addiction focused on Internet use is often called Internet Addiction Disorder (IAD).


The various types of computer addicts have different reasons for their habits. Obsessive chat room use or e-mailing might fill a void of loneliness, while excessive viewing of pornography might stem from relationship problems or childhood abuse. The matter is further complicated by the fact that a computer is a useful tool. It's not like heroin, for example -- there are many legitimate reasons why someone might spend hours using a computer.Even if someone uses a computer extensively for purely recreational purposes, that doesn't necessarily represent a real addiction any more than someone who spends hours working on a model train set, makingquilts or gardening is "addicted" to those activities. Even the agreed-upon definition of addiction itself has evolved over the decades and remains a matter of debate in the medical community. In fact, the American Medical Association and the American Psychiatric Association do not currently consider computer addiction a valid diagnosis, a controversy we'll discuss later.As a result of all these complications, any single definition of computer addiction is necessarily broad and a little vague. If the computer use is so pervasive that it interferes with other life activities, and if the user seems unable to stop using the computer to excess despite negative consequences, the problem might be a computer addiction.
Read More