Thursday, 23 January 2014

Safe In Cloud - The Best Password Manager for Android, iOS and Windows






When it comes to password managers, LastPass pretty much seals the deal for most of us. That said, there are several other choices that keep popping up on the scene. One of them that I recently came across is Safe In Cloud for Windows and Android. The interesting bit about Safe In Cloud is that, unlike LastPass, it synchronizes your passwords to your own cloud storage and supports Dropbox, Google Drive, SkyDrive and Box.net. The application has a really clean interface, and does a wonderful job of safely storing passwords, notes, credit card numbers, email accounts and more. It keeps your all passwords in an encrypted database shielded by 256-bit AES encryption, making it quite safe and secure. What’s more, it can also import and export data between other password managers, and sports full browser integration with Firefox and Chrome.



After installation, Safe In Cloud brings up a configuration wizard allowing you to create a new database, as well as offering existing users to restore their passwords from the cloud. When creating a new database, the application will also ask you to set a new password, displaying its strength according to how secure it is.
Next, you’re presented with the app’s main interface, which looks plain and simple. The application carries a list of a few predefined templates such as business, private, samples, unlabeled etc. There templates allow you keep supported items more accessible and organized. For instance, you can create a passwords template for all your email accounts and manage them under one roof. Likewise, you can create a separate template for bank and credit card details. Safe In Cloud also lets you store notes and many additional types of items.


When it comes to templates, you’re offered the options of Code, Credit Card, Email Account, ID/Passport, Insurance, generic Login/Password, Membership, and Web Account. In addition, you can also create a custom template that suits your specific requirements for a type of information set.
As mentioned earlier in the review, you can easily sync your data between your PCs and Android devices. The application makes use of Dropbox, Google Drive, Box or SkyDrive for the purpose. But first, you will need to authenticate your desired service from the Options window. You’ll have to sign in to your cloud storage and provide the appropriate permissions to get started. The Options window also allows specifying a few security parameters related to the app. For instance, you can set it to erase any clipboard items after a specified interval, and lock Safe In Cloud when it’s no longer running in a foreground window, requiring you to enter the master password again when you open it.
Safe In Cloud for Windows is available for free but if you want to use the service on Android as well, you’ll have to shell out $4.99 at Google Play for it.

Download on the App Store                                Get it on Google play                                      Download for Windows
Read More

Monday, 30 September 2013

What Files Are..?

Files are the collection of data onto a permanent storage structure. They are stored on a permanent storage media such as a computer hard drive, CD ROM drive, floppy disk drive or sometimes even a tape drive. Files take a certain amount of room to store. For example if you have two text files and one file has one sentence in it while the other file has 200 sentences in it, the file with 200 sentences will use more room on the storage media.

File Functions

Different files have different purposes. Files are used to do one or more of the following functions:
Provide machine executable code which is used to run application programs and the operating system.
Store application program or operating system configuration information.
Store data used by the user such as Microsoft Word document files.

Therefore there are three types of information that files contain:

  1. Executable code.
  2. System or program configuration information.
  3. User data.
These files are read by an application program or the operating system.

File Characteristics

Files have the below characteristics:

  1. Name
  2. Optional extension name - Part of the name, it is used by Windows operating systems to identify an associated program that can be used to read it
  3. Size - Shows the space the file requires for storage normally showed in kilobytes (Kb) which is 1000 bytes
  4. Type - Indicates the program used to access the file. The next section will talk more about file types.
  5. Date Modified - Shows the last date the file was created or changed.
  6. File structure - This characteristic is not view-able by the computer user but some programs can examine file structure to determine the type of file it is even when the file extension is changed.

The main items to remember include the facts that all files take a certain amount of room on their storage media and all files have a type which indicates whether they can be run by your computer. The file extension is one indication of the file type but not the only way to determine type.


If you are browsing your files using "My Computer" and click on "View" and "Details" you will see a window showing the file characteristics like the one below. Folders only take a little room on the hard drive and do not normally take as much room as files.

Read More

Linux is Multiuser, Multitasking Operating System

Many students who study Unix programming and shell scripting have a question - “How is Linux a mutlitasking operating system?”, as they work from a terminal which looks like DOS.



Let us start with basics.


A single-user operating system is a type of operating system that is developed and intended for use on a computer or similar machine that will only have a single user at any given time. This is the most common type of OS used on a home computer, as well as on computers in offices and other work environments.


There are two general types of single-user operating system:

1. Single tasking

2. Multitasking systems.



Single tasking systems are the systems which are designed to manage the computer so that one user can effectively do one thing at a time.

The Palm OS for Palm hand held computers is a good example of a modern single-user, single-task operating system. DOS is also one the examples.


Multitasking refers to an operating system in which multiple processes, also called tasks, can execute (i.e., run) on a single computer seemingly simultaneously and without interfering with each other. That is, each process has the illusion that it is the only process on the computer and that it has exclusive access to all the services of the operating system.

Windows 95, Windows 98, Windows NT workstations and older Mac system are the examples of single user multitasking operating system.


A multi-user operating system allows many different users to take advantage of the computer's resources simultaneously. The operating system must make sure that the requirements of the various users are balanced, and that each of the programs they are using has sufficient and separate resources so that a problem with one user doesn't affect the entire community of users.

Linux, Unix, VMS and mainframe operating systems, such as MVS, are examples of multi-user operating systems.


There can be more than one users on a Linux system who can login through terminals simultaneously. This way Linux is multiuser OS.


Next time when you login in your Linux/Unix classes, try to run who command. You may find more than one users logged from different terminals along with you. The processes of different users are separate from each other and they get the CPU share equally. The CPU preempts very fast and so Linux is a mutlitasking OS. In fact when you run ps command you will get the name of processes being run from your terminal. And in order to get all the processes being run by the OS type ps aux command.


Linux terminal can run your processes in background too. Append a '&' to your command and run ps. You will get the job being run in background and at the same time your terminal free for next job.
Read More

Thursday, 20 September 2012

‘Linux: A Virus-Free OS’ – Truth or Myth ?



Linux the term is altogether an alien word for many people. And of the handful of people switching or let’s say having their ‘tryst’ with Linux, have a very common misconception – ‘Linux is virus free.’ A very debatable sentence, lets take a look at some arguments.
For getting to our point lets take a look at how a linux system works. Linux works in a multi-user environment, where users are given privileges of different magnitude for different purposes. A typical user would have normal privileges, simple enough to help him use the system but not change major system settings.
To spread a virus around you’ll have to gain access to the core of a linux system and for that you’ll need to have root access.
Linux is centered around security and gaining root access is nearly impossible. But, as they say, impossible is nothing. Viruses for linux  are on the rise. One of the major reasons is due to the fact that linux is being spread and marketed at quite a fast rate.
To accommodate novice users, GUI’s are being integrated. And this is one of the causes of rise in viruses. How? The following is a quote from a foobar blog post:
Then you save an email attachment under Linux, the execute flag is normally NOT set and thus, the file can’t be executed just by clicking on it. So, no luck?
Not so fast. Modern desktop environments, such as Gnome and KDE, conveniently offer a nice “workaround” called ‘launchers’. Those are small files that describe how something should be started. Just a few lines that specify the name, the icon that should be displayed and the actual command to execute. Conveniently, the syntax of those launcher files is the same for Gnome and KDE. And those launchers don’t have to have any execute permissions set on them! Desktop environments treat those files as a special case, so when you click on them Gnome or KDE will happily execute the command that was specified within the launcher description and without the need for the execute bit to be set on the launcher itself. Now we are getting somewhere!
But don’t jump the gun yet. Most of the linux distros are still way safer than Windows systems. The reason being that as they are open source and have full disclosure, developers are quick to release patches/fixes.
Also the reason why Linux viruses are rare, is because of the simple fact that the world has too muchWindows Users. So if a hacker could write a code and hack (for eg.) 60% of the world’s computers (as they are Windows-based systems) instead of only a handful of Linux computers, what would he choose?
Read More

The 10 Best Free Anti-Virus Programs


There are many free anti-virus programs on the market, and you want to sort the wheat from the chaff. Fair enough. Documented here are the 10 best antivirus programs on the market.

Microsoft Security Essentials
10 best antivirus programs
Released by Microsoft in late 2009, Microsoft Security Essentials sports more than a typically verbose Microsoft name: it’s also a really good antivirus. Lightweight enough to run on older machines without crippling their performance, yet competent enough to handle most viruses and malware out there.
Perhaps the best part of MSE is its simplicity. As you can see, the user interface is really clear, with large buttons for the most basic functions. This is important if you’re setting it up on a computer for someone who is not computer-savvy.
Finally, MSE is completely free – there’s no professional version you can upgrade to. In fact, it’s even permissible to use in business situations, meaning you can use it at work without breaking the law. This alone sets it above most of the other selections for the 10 best antivirus programs.

AVG Free

This one recently topped our Movers and Shakers list of the top downloaded free anti-virus programs. But just because AVG is popular doesn’t mean it’s not great.
AVG has become synonymous with free anti-virus, and there’s a reason for this: AVG offers complete malware protection, with considerably less bloat than the top pay-to-use antivirus clients. And while AVG Free does constantly remind you that you could pay for the professional version of the program, it does this without ever getting in the way of the program’s core purpose: protecting you from viruses.
10 best antivirus programs
Though when it comes to upgrading one version of AVG to another, you need to make sure you’re good at reading what’s on screen, because the free download is only available via a tiny link at the bottom of the screen””the site really wants you to get the paid version. When upgrading to version 9 recently, for example, check out how hidden the free download was:

Not exactly a big link, is it? Figure this minor inconvenience out, however, and AVG is a a really good free anti-virus. Download AVG.

Avira Free

free antivirus programs
In terms of simplicity, Avira’s right up there with MSE. It’s fairly lightweight, too, so the comparison is quite apt. While Avira does have a paid professional version to peddle, much like AVG, it’s not quite as aggressive as AVG in peddling it. I’d say Avira is solid and worth looking into for sure. Download Avira Free here.

Avast! Free

If this competition were for the coolest name, the piratey Avast! would win hands down. Even though that’s not what we’re discussing, Avast! stands up pretty well. This is one of the top free anti-viruses on the market, and for good reason: it’s remarkably complete. Expect great all-around protection, including against trojans and spyware. You can also expect constant reminders that there’s a free version you can upgrade to, on your desktop and in your inbox. Still, the protection is solid.

Malwarebytes

free antivirus programs
Whatever your default anti-virus is, you need Malwarebytes too. This program doesn’t run in your system background and constantly protect you, but when you run into a problem running Malwarebytes will usually take care of what other programs can’t. I’ve saved more than a few unbootable systems by running Malwarebytes from safe mode. This program takes care of any form of malware you throw at it, so keep it around. In fact, I’d keep this one on your flash drive in case you ever need to fix a computer for a friend (and if you’re reading this blog, you probably will).

Combo Fix

Consider this the nuclear option. If you know you’ve got a virus, but your usual anti-virus program can’t handle it, and Malwarebytes can’t handle it, it’s time for ComboFix. This program isn’t friendly: it runs from a command window and is proud of it.  And this is not a program you should use if you don’t know what you’re doing, because it can have devastating effects in the hands of the uneducated. But when all else fails, ComboFix delivers. Every geek should have this one on their keychain.

Clamwin

free antivirus programs
Clamwin is the Windows version of ClamAV, the main Linux anti-virus on the market. ClamWin is flawed in many ways: it simply scans instead of offering real-time protection, it doesn’t really do non-virus malware and it’s not exactly easy to use. Still, having ClamWin around doesn’t cost anything, and you can never have enough scanning tools in your arsenal.
Download ClamWin and see if you like it.

Panda Cloud AntiVirus

totally free antivirus programs
At first I thought the idea of a cloud-based antivirus was stupid, because it would only work while I’m online. Then it occurred to me: why the heck do I need an anti-virus when I’m offline?
As the name suggests, Panda Cloud Antivirus stores its virus definitions online. There’s an upside to this: your definitions are always up to date. There’s a downside, too, however: your anti-virus is constantly making use of your network connection.
I’d say this is a really good idea for underpowered PCs with constant access to the net. Like, say, a netbook. But if you’ve got a netbook you shouldn’t be using Windows anyway; switch to Jolicloud and you’ll have a functional netbook operating system immune to practically every virus.
Read a previously published article on Panda Cloud. Then download Panda Cloud Antivirus if you’re interested.

Comodo Firewall + Antivirus

Comodo is best known for its free firewall, but it also offers a bundled firewall and antivirus program. While the Comodo firewall isn’t the easiest to use, and the antivirus doesn’t include protection for non-virus forms of  malware, this one’s worth mentioning if you’re looking for a free security suite which includes both a firewall and anti-virus protection.
totally free antivirus programs

Common Sense 2012

This one’s unusual in that it’s free and considered by far the best protection out there, yet can’t be downloaded anywhere. Without it, however, even the best security software is rendered useless.
If you haven’t already figured this out, Common Sense 2012 isn’t a product you can download so much as it is a state of mind. If you’re going to be free of viruses and malware you need to use your head while browsing the web. The most important thing to remember is this: if something sounds too good to be true, it probably is””and your computer will probably be compromised.
Free porn usually isn’t. Warez are best to be avoided altogether. Nigerians that need your help transferring money are never actually princes or princesses. You get the idea: avoid shady sites online and you’ll find you’ll get far less malware on your machine.

Conclusion

There are a lot of great free anti-virus programs out there, but what you use is mostly a matter of preference. Myself, I use Microsoft Security Essentials on my Windows machine because it’s free, lightweight and will never ask me for money. But I also make sure I always have Malwarebytes on my thumb drive for quickly removing viruses and malware from the computers of friends and family.
What about you? Which free anti-virus do you prefer? Commenting is good for you, so do so!

Read More

Wednesday, 23 November 2011

How to configure Gmail With Microsoft outlook Express Step by Step

Outlook Express is easily the most popular Windows e-mail program. One reason for its popularity, of course, is that it is built into every Windows operating system. Outlook Express is easy to use and easy to upgrade.
Enabling POP
You can retrieve your Gmail messages with a client or device that supports POP, like Microsoft Outlook or Netscape Mail.
To enable POP in Gmail:
  • Sign in to Gmail.
  • Click Settings at the top of any Gmail page.
Click Forwarding and POP/IMAP


  • Select Enable POP for all mail or Enable POP for mail that arrives from now on.
  • Choose the action you'd like your Gmail messages to take after they are accessed with POP.
Configure your POP client* and click Save Changes
To set up your Outlook Express client to work with Gmail:
  • Open Outlook or Outlook Express.
  • Click the Tools menu, and select Accounts...
  • Click Add and then click Mail...

  • Enter your name in the Display name: field, and click Next.
  • Enter your full Gmail email address (username@gmail.com) in the Email address: field, and click Next.

Enter pop.gmail.com in the Incoming mail (POP3, IMAP or HTTP) server: field. Enter smtp.gmail.com in the Outgoing mail (SMTP) server: field.

  • Click Next.
  • Enter your Gmail username (including '@gmail.com') in the Account name: field. Enter your Gmail password in the Password field:, and click Next


  • Click Finish.
  • Highlight pop.gmail.com under Account, and click Properties.
  • Click the Advanced tab.
  • Fill in the following information:
1. Check the box next to This server requires a secure connection (SSL) under Outgoing Mail (SMTP).
2. Enter 465 in the Outgoing mail (SMTP): field.
3. Under Outgoing Mail (SMTP), check the box next to this server requires a secure connection (SSL).
4. Under Incoming mail (POP3), check the box next to this server requires a secure connection (SSL). The port will change to 995.
Return to the Servers tab, and check the box next to My server requires authentication.
Click
OK.
Congratulations! You're done configuring your client to send and retrieve Gmail messages.
Read More

What is Cloud Computing & How it works ?

Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network (typically the Internet).



Layers
Once an internet protocol connection is established among several computers, it is possible to share services within any one of the following layers.


Client
A cloud client consists of computer hardware and/or computer software that relies on cloud computing for application delivery and that is in essence useless without it. Examples include some computers, phones and other devices, operating systems, and browsers.
Application
Cloud application services or "Software as a Service (SaaS)" deliver software as a service over the Internet, eliminating the need to install and run the application on the customer's own computers and simplifying maintenance and support.
Platform
Cloud platform services, also known as platform as a service (PaaS), deliver a computing platform and/or solution stack as a service, often consuming cloud infrastructure and sustaining cloud applications. It facilitates deployment of applications without the cost and complexity of buying and managing the underlying hardware and software layers. Cloud computing is becoming a major change in our industry, and one of the most important parts of this change is the shift of cloud platforms. Platforms let developers write certain applications that can run in the cloud, or even use services provided by the cloud. There are different names being used for platforms which can include the on-demand platform, or Cloud 9. It's your choice on what you would like to call the platform, but they all have great potential in developing. When development teams create applications for the cloud, they must build its own cloud platform.
Infrastructure
Cloud infrastructure services, also known as "infrastructure as a service" (IaaS), deliver computer infrastructure – typically a platform virtualization environment – as a service, along with raw (block) storage and networking. Rather than purchasing servers, software, data-center space or network equipment, clients instead buy those resources as a fully outsourced service. Suppliers typically bill such services on a utility computing basis; the amount of resources consumed (and therefore the cost) will typically reflect the level of activity.
Server
The servers layer consists of computer hardware and/or computer software products that are specifically designed for the delivery of cloud services, including multi-core processors, cloud-specific operating systems and combined offerings.

Deployment modelsCloud computing types

Public cloud

Public cloud describes cloud computing in the traditional mainstream sense, whereby resources are dynamically provisioned to the general public on a fine-grained, self-service basis over the Internet, via web applications/web services, from an off-site third-party provider who bills on a fine-grained utility computing basis.

Community cloud

Community cloud shares infrastructure between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. The costs are spread over fewer users than a public cloud (but more than a private cloud), so only some of the benefits of cloud computing are realized.

Hybrid cloud

Hybrid cloud is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. It can also be defined as multiple cloud systems that are connected in a way that allows programs and data to be moved easily from one deployment system to another.

Private cloud

Private cloud is infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally.
They have attracted criticism because users "still have to buy, build, and manage them" and thus do not benefit from lower up-front capital costs and less hands-on management, essentially "[lacking] the economic model that makes cloud computing such an intriguing concept".


Architecture

Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically involves multiple cloud components communicating with each other over a loose coupling mechanism such as a messaging queue.

The Intercloud

The Intercloud is an interconnected global "cloud of clouds" and an extension of the Internet "network of networks" on which it is based.

Cloud engineering

Cloud engineering is the application of engineering disciplines to cloud computing. It brings a systematic approach to the high level concerns of commercialization, standardization, and governance in conceiving, developing, operating and maintaining cloud computing systems. It is a multidisciplinary method encompassing contributions from diverse areas such as systems, software, web, performance, information, security, platform, risk, and quality engineering.

Read More