Results for "Education"
The most common Internet/computer security threats. & How to Stay Safe Online ?
Technology has become an inevitable part of our lives. And while Internet offers a mass amount of useful information, makes communication easier and faster than ever, it presents some threats too along the way.

Technology has become an inevitable part of our lives. And while Internet offers a mass amount of useful information, makes communication easier and faster than ever, it presents some threats too along the way.

The types of computer security threats

Trojan: Trojan is one of the most complicated threats among all. Most of the popular banking threats come from the Trojan family such as Zeus and SpyEye. It has the ability to hide itself from antivirus detection and steal important banking data to compromise your bank account. If the Trojan is really powerful, it can take over your entire security system as well. As a result, a Trojan can cause many types of damage starting from your own computer to your online account.

Virus: Looking at the technology 10 years back, Virus is something really popular. It is a malicious program where it replicates itself and aim to only destroy a computer. The ultimate goal of a virus is to ensure that the victim’s computer will never be able to operate properly or even at all. It is not so popular today because Malware today is designed to earn money over destruction. As a result, Virus is only available for people who want to use it for some sort of revenge purpose.

Worms: One of the most harmless threats where it is program designed only to spread. It does not alter your system to cause you to have a nightmare with your computer, but it can spread from one computer to another computer within a network or even the internet. The computer security risk here is, it will use up your computer hard disk space due to the replication and took up most of your bandwidth due to the spread.

Spyware: Is a Malware which is designed to spy on the victim’s computer. If you are infected with it, probably your daily activity or certain activity will be spied by the spyware and it will find itself a way to contact the host of this malware. Mostly, the use of this spyware is to know what your daily activity is so that the attacker can make use of your information. Such as if you browse on sex toys for a week every day, the attacker will try to come out with a sex toy scam to cheat on your money.

Scareware: Scareware is something that plant into your system and immediately inform you that you have hundreds of infections which you don’t have. The idea here is to trick you into purchasing a bogus anti-malware where it claims to remove those threats. It is all about cheating your money but the approach is a little different here because it scares you so that you will buy.

Keylogger: Something that keeps a record of every keystroke you made on your keyboard. Keylogger is a very powerful threat to steal people’s login credential such as username and password. It is also usually a sub-function of a powerful Trojan.

Adware: Is a form of threat where your computer will start popping out a lot of advertisement. It can be from non-adult materials to adult materials because any ads will make the host some money. It is not really harmful threat but can be pretty annoying.

Backdoor: Backdoor is not really a Malware, but it is a form of method where once a system is vulnerable to this method, attacker will be able to bypass all the regular authentication service. It is usually installed before any virus or Trojan infection because having a backdoor installed will ease the transfer effort of those threats.




Wabbits: Is another a self-replicating threat but it does not work like a Virus or Worms. It does not harm your system like a Virus and it does not replicate via your LAN network like a Worms. An example of Wabbit’s attack is the fork bomb, a form of DDoS attack.

Exploit: Exploit is a form of software which is programmed specifically to attack certain vulnerability. For instance if your web browser is vulnerable to some out-dated vulnerable flash plugin, an exploit will work only on your web browser and plugin. The way to avoid hitting into exploit is to always patch your stuff because software patches are there to fix vulnerabilities.

Must Read: Secure Your Accounts Against Cybercrime


Botnet: Botnet is something which is installed by a BotMaster to take control of all the computer bots via the Botnet infection. It mostly infects through drive-by downloads or even Trojan infection. The result of this threat is the victim’s computer, which is the bot will be used for a large scale attack like DDoS.



Dialer: This threat is no longer popular today but looking at the technology 10 years back or more where we still access the internet using a dial-up modem, it is quite a popular threat. What it does is it will make use of your internet modem to dial international numbers which are pretty costly. Today, this type of threat is more popular on Android because it can make use of the phone call to send SMS to premium numbers.

Dropper: Looking at the name, a Dropper is designed to drop into a computer and install something useful to the attacker such as Malware or Backdoor. There are two types of Dropper where one is to immediately drop and install to avoid Antivirus detection. Another type of Dropper is it will only drop a small file where this small file will auto trigger a download process to download the Malware.

Fake AV: Fake Antivirus threat is a very popular threat among Mac user about 10 months ago. Due to the reason that Mac user seldom faces a virus infection, scaring them with message which tells them that their computer is infected with virus is pretty useful where it results them into purchasing a bogus antivirus which does nothing.

Phishing: A fake website which is designed to look almost like the actual website is a form of phishing attack. The idea of this attack is to trick the user into entering their username and password into the fake login form which serves the purpose of stealing the identity of the victim. Every form sent out from the phishing site will not go to the actual server, but the attacker controlled server.

Cookies: Cookies is not really a Malware. It is just something used by most websites to store something into your computer. It is here because it has the ability to store things into your computer and track your activities within the site. If you really don’t like the existence of cookies, you can choose to reject using cookies for some of the sites which you do not know.

Bluesnarfing: Bluesnarfing  is all about having an unauthorized access to a specific mobile phones, laptop, or PDA via Bluetooth connection. By having such unauthorized access, personal stuff such as photos, calender, contacts and SMS will all be revealed and probably even stolen.

Bluejacking: Bluejacking is also uses the Bluetooth technology but it is not as serious as Bluesnarfing. What it does is it will connect to your Bluetooth device and send some message to another Bluetooth device. It is not something damaging to your privacy or device system compared to the Bluesnarfing threat.

DDoS: One of the most famous thing done by Anonymous, which is to send millions of traffic to a single server to cause the system to down with certain security feature disable so that they can do their data stealing. This kind of trick which is to send a lot of traffic to a machine is known as Distributed Denial of Service, also known as DDoS.


Boot Sector Virus: It is a virus that places its own codes into computer DOS boot sector or also known as the Master Boot Record. It will only start if there it is injected during the boot up period where the damage is high but difficult to infect. All the victim need to do if they realize there is a boot sector virus is to remove all the bootable drive so that this particular virus will not be able to boot.

Browser Hijackers: A browser hijacker uses the Trojan Malware to take control of the victim’s web browsing session. It is extremely dangerous especially when the victim is trying to send some money via online banking because that is the best time for the hijacker to alter the destination of the bank account and even amount.



Chain Letters: When I was small, I got tricked with chain letters written by my friend. But chain letters does not stop at that era. It brings to adult life as well where people like to send chain letter such as Facebook account delete letter. It usually says if you don’t forward that particular message or email to 20 people or more, your account will be deleted and people really believe that.

Virus Document: Virus today can be spread through document file as well especially PDF documents. Last time, people will only advice you not to simply execute an EXE file but in today’s world with today’s technology, document file should also be avoided. It is best if you use an online virus scanner to scan first before opening any single file which you feel it is suspicious.

Mousetrapping: a Mousetrapping Malware before where what it does is it will trap your web browser to a particular website only. If you try to type another website, it will automatically redirect you back. If you try clicking forward/backward of the navigation button, it will also redirect you back. If you try to close your browser and re-open it, it will set the homepage to that website and you can never get out of this threat unless you remove it.

Obfuscated Spam: To be really honest, obfuscated Spam is a spam mail. It is obfuscated in the way that it does not look like any spamming message so that it can trick the potential victim into clicking it. Spam mail today looks very genuine and if you are not careful, you might just fall for what they are offering.

Pharming: Pharming works more or less like phishing but it is a little tricky here. There are two types of pharming where one of it is DNS poisoning where your DNS is being compromised and all your traffic will be redirected to the attacker’s DNS. The other type of pharming is to edit your HOST file where even if you typed www.google.com on your web browser, it will still redirect you to another site. One thing similar is that both are equally dangerous.

Crimeware: Crimeware is a form of Malware where it takes control of your computer to commit a computer crime. Instead of the hacker himself committing the crime, it plants a Trojan or whatever the Malware is called to order you to commit a crime instead. This will make the hacker himself clean from whatever crime that he had done.

SQL Injection: SQL injection does not infect the end users directly. It is more towards infecting a website which is vulnerable to this attack. What it does is it will gain unauthorized access to the database and the attacker can retrieve all the valuable information stored in the database.

Ransomware: Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through certain online payment methods to get a decrypt key.

Rogue security software: A special type of threat is software that claims to be security software. It tricks users that have installed it to pay a sum of money to be really protected (which they will not be). Most often it pretends to be antivirus and antispyware programs.

||Satnam Shri Waheguru Ji|| undocopy.com Friday, August 12, 2016
Best Tech and Computer Magazines

Here is a list of top ten Computer and Technology magazines that will give you great edge on current Trends and happenings around the Tech field.Apart from news these magazines provides Gadget Reviews,How to Tips and solutions to common encountered problem in their Niche.

1Wired

Most famous Tech Magazine which discuss about the Latest Gadgets and Articles related to Science and technology.The subscription charges are different for USA and other countries.

2. PCWorld

The one and only magazine you need if you are passionate about Gadgets,Every month It presents Gadgets Reviews,Computer How to Tips and Free Applications which comes in a DVD.

3. Linux Journal

The most popular Linux magazine,You can get to know the news around Linux and Opensource software’s.You can read Reviews about latest Opensource Software’s and Linux Distributions.Apart from that they are very popular for their Linux How To Articles.

4. Mac World

If you are a Mac user then you definitely need this magazine,It provides the Review about Latest Apple releases,both Hardware and software.You can also discover latest iPhone and iPad Apps.

5. PC Magazine

Provides Review of Latest Smart Phones,Laptops,Desktops and Digital Cameras.They also provide News,PC tips,Internet Tips and Software Downloads.

6.  .NET Magazine

If you are Web Developer or Software Developer you badly need this excellent Magazine,It provides lot of Tutorials.You can also read latest news in IT field and Interviews by famous Tech personalities.

7. Computer World

This magazine provides latest IT news and Gadget Reviews,Most attractive feature is “It is Free of Cost” yes You can Subscribe this magazine without spending a penny.

||Satnam Shri Waheguru Ji|| undocopy.com Thursday, August 11, 2016
Best Secure Messaging Apps.
Encrypted messages can't be read by anyone but the intended 
Managing your email inbox is an important part of running a business, but email exchanges can be slow and fragmented. For quick and easy communication, instant messaging is more convenient than email, and more secure than SMS text messaging at least if you have the right app. A secure messaging application will let you safely exchange private information with employees, clients and co-workers, without worrying that your data could be compromised.


But what does it mean for messaging to be secure? Usually, it means that your messages are encrypted before they even leave your device. Encrypted messages can't be read by anyone other than the intended recipient, even if they're intercepted during the exchange. Some apps even offer self-destruct functionality, letting you send messages that are automatically deleted after they're read. No messaging app is totally foolproof, but business users with privacy concerns would be wise to check out these five secure messengers for iPhone, Android, Windows Phone and BlackBerry devices.

Signal Private Messenger (Free) – Android, iOS
Secure, free and easy to use, Signal Private Messenger (available on iOS and Android) is our favorite secure texting app overall. The app features end-to-end encryption to keep all of your private correspondences secure. And while it’s simpler than some of the other options on this list, it has plenty of features that power users will appreciate. That includes the ability to set up encrypted groups for private conversations with your entire work team. And while most secure messaging apps require both parties to be using the same application for encryption to work, Signal Private Messenger sets itself apart by working with standard SMS text messages, as well as SMS picture messages. That means business users can use the app to add an extra layer of security to regular texting, even if the client or colleague you're messaging isn't on board.

BlackBerry Messenger (Free) – iOS, Android, Windows Phone, BlackBerry
BlackBerry Messenger (BBM) has broader compatibility than most messaging apps; it's the obvious pick for BlackBerry users, and it's also available for Android, iOS and Windows Phone devices. Instead of connecting with others using phone numbers or email addresses, each user is identified by a unique personal identification number (PIN). That keeps the service private and gives you more control over who contacts you. All messages are encrypted during transmission, and pass through a firewall before they hit BlackBerry's servers, so they can only be decrypted by a private key on the intended receiver's device. Individual businesses can also obtain a unique encryption key for an extra layer of security.

Gliph (Free) – Android, iOS
Gliph is a secure messaging service that you can use on all of your computing devices. When you're on the go, use the iOS or Android app on your smartphone. When you're at the office, use the Gliph desktop app so you can send and receive messages using a mouse and keyboard. Another key feature is "Real Delete," which lets you permanently delete a message from both the sending and receiving device, as well as the Gliph server, whenever you choose. You can also attach a pseudonym to your main account at any time, so you can use a screen name for personal chatting and switch back to your real name for professional communications.

Wickr (Free) – Android, iOS
Wickr (available for Android and iOS) is a secure messaging app that lets you set an "expiration date" for every message you send; just select a date and time for your media to expire, and it will automatically be deleted at that time. That way, you don't have to worry about a third party inadvertently reading private communications that are left on a contact's smartphone. Meanwhile, the app features end-to-end encryption for all messages, and it lets you remove metadata from individual messages, such as the time it was sent, as well as geo-location data. Another handy feature gives you the ability to completely clear away message files that have been manually deleted but still reside on your smartphone's memory. Wickr also has standard messaging features, like the ability to chat with groups of up to 10 people at once.

Telegram – Android, iOS, Windows Phone
Telegram (available for Android, iOS and Windows Phone) is a messaging app that features end-to-end encryption so your messages can only be read by the intended recipients, with no data logged on Telegram's servers. Like Wickr, Telegram lets you program your messages to self-destruct from both devices at a particular time so there's no record of it. It's also a solid app for everyday messaging, letting you create group chats with up to 200 people so you can stay connected with everyone in your company at once. Regular messages are stored in the cloud so you can easily access them from any device running the Telegram app. Support for Windows Phone also helps this app stand out, making it one of the few good alternatives to BlackBerry Messenger on the platform.

||Satnam Shri Waheguru Ji|| undocopy.com Tuesday, August 9, 2016
Top Ways People End Up Getting Hacked and how to stay safe ?
In this day and age, internet users are under constant threats from hackers and cybercriminals. Additionally, said users know very little of the precautions that need to be taken in order to protect themselves. As difficult as it may sound, it is really entirely impossible and extremely simple for internet users to protect their presence online, and it can be made simpler if one is aware of the most common ways people end up getting hacked. Keeping this in mind, here are the top 5 ways that hackers mostly resort to in order to victimize internet users.

1. Brute Force Attack

It is important to note that cracking a password as simple as '12345' can take no more than a second, so it really does not come as a surprise at all that hackers rely on brute force attacks to get access to confidential information and files. Seeing how people, including Mark Zuckerberg, tend to use simple passwords,hacking becomes a breeze that is unless users start using stronger passwords and avoiding using them over and over again while creating new accounts.

2. Password Reuse Attacks

As mentioned earlier, using simple passwords can put users at great risk – Mark Zuckerberg – co-founder and chairman of Facebook too made the same mistake which resulted in several of his accounts being compromised in the process. If he had used several different passwords, the problem would not have been so difficult to deal with in the first place. Since most users tend to make the very same mistake, hackers find it to be one of the most effective ways to compromise several different accounts of the same user.
To avoid this problem, it is necessary for users to create strong and unique passwords for each account. Additionally, if they find it difficult to remember these passwords, they should utilize a password manager rather than make things incredibly easy for hackers and cybercriminals.

3. Social Engineering

Social engineering includes several techniques like whaling, vishing, phishing, spear phishing and privilege misuse. The method is used to trick users into giving out confidential information. This could be in the form of an email from a service provider or even a colleague, which makes it all the more legitimate for users to let their guard down thus giving hackers and cybercriminals the edge they need to achieve their goals.

4. Malware

Another common way people end up getting hacked is by involuntarily downloading malware programs. These programs are usually transmitted via email attachments, emails that link to other pages and websites that offer free downloads. To prevent this from happening, users need to make sure their emails are originating from a reliable source. Moreover, they should also stay clear from unknown and unreliable sites.

5. Physical Theft

A lot of people tend to make the terrible mistake of noting down their credentials on post-it notes or in their diaries/journals. Even though the method is not necessarily a high-tech hack, it still counts seeing how many people end up losing their information through physical theft.

6.Phishing scams

Lucky you! A Nigerian prince has selected you to help smuggle millions out of his country. For a little bit of effort — a few simple wire transfers — you'll get a substantial cut. What could be easier?
bet you're asking yourself, "Who would fall for that?" Well, tens of thousands of people do every year. That's why Nigerian scams, known as 419 scams, are still very popular.

Also See: How to protect your phone and avoid being hacked


Other versions might say you won a contest or have a job offer. Maybe someone wants to meet you, or you can make money for shipping some goods.

The catch is that you have to send in personal or banking information, or pay a fee. Of course, your information and money is going straight to hackers.
Use common sense before reacting to any e-mail. Scams rely on making you act quickly. If you think about things long enough, you can usually see through them. Just remember the old saying, "If it looks too good to be true … "

7. Trojan horse

Many hackers want to slip a virus on your computer. Once installed, a virus can record everything you type and send it back to the hacker. It can send out spam e-mail or attack other computers.
To do this, the hackers disguise the virus as something harmless. This is called a Trojan horse, or just Trojan.
One of the most popular ways to deliver a Trojan is a variation of the phishing e-mail scams.

For example, the e-mail might say it's from a shipping service, bank or other reputable company. There's been a problem with a transaction! To learn more, you have to open an e-mail attachment.

The attachment might look like a normal file, but it really contains a Trojan. Clicking on the file installs it before you can do anything.


See Also: Steps to Maximize your Wireless Network Security


Similar scams appear on Facebook and Twitter. You think you're going to watch a funny video your friend posted. Instead, a popup tells you to update your video player. The "update" file it provides is really a Trojan.
The key to defeat this tactic, as with phishing e-mails, is common sense. However, up-to-date security software is essential as well. It should detect and stop most Trojans before they can install.

8. Drive-by downloads

Security software is good, but it isn't always enough. Programs on your computer might have weaknesses that hackers can use to bypass security software.
To take advantage of these weaknesses, hackers set up websites embedded with viruses. You might get there by clicking a malicious link in a phishing e-mail or on social media. You can even find these sites in a search for popular programs or topics.

It isn't just malicious sites, though. Hackers can sneak malicious code on to legitimate websites. The code scans your computers for security holes. If it finds one, a virus can download and install without you doing anything.

To stay safe, you have to keep your programs up-to-date. Every month, Microsoft releases updates for Windows and Internet Explorer. These updates close critical security holes that hackers exploit.
Other critical programs to patch are Adobe's Flash and Reader, and Oracle's Java. Using old versions of these programs is like sending hackers an engraved invitation.

You should also be using the latest version of your programs. Anyone using Internet Explorer 6, 7 or 8 needs to update or switch browsers immediately.

9. Bypassing passwords

Hackers are masters of guessing account passwords. In the real world, however, very few hackers bother.
Instead, they go around passwords. They might get your password from a data breach at a company or website you use.

It's important that you use a different password for every account. That way, if a hacker discovers one, they can't get in to every account.
Perhaps the hacker slipped a virus on to your system. It records your passwords and sends them to the hacker; no guessing needed.
As mentioned above, you can stop viruses with up-to-date security software and programs.

A hacker might tackle your account's security question. Most security questions can be answered with information people post publicly.

You should change how you answer security questions. Give a random answer that has nothing to do with the question. That way, no one can guess it.

10. Using open Wi-Fi

sure you have a Wi-Fi network at home. Is it encrypted? If you don't know the answer, then it's probably, "no."
That means hackers, and neighbors, can connect to your network from outside. They can see and record everything you do. They can surf to bad websites and download illegal files on your connection. You might be getting a visit from the police.

You need to take a few minutes and secure your network. Trust me; it's worth it. The instructions will be in your Wi-Fi router's manual.


That being said, now that you know of the top 5 ways people end up getting hacked, you will be able to better protect yourself. Furthermore, you can also ensure you do not end up making similar mistakes. But then again, if you are not sure where to start and how to simplify the process of protecting yourself online, you can start by taking advantage of what PureVPN has to offer. Not only will you be able to enhance your online security and anonymity, but you can make sure nobody monitors or tracks your online traffic.

||Satnam Shri Waheguru Ji|| undocopy.com Monday, August 8, 2016
What is Twitter ?
Twitter is a social network and real-time communication service launched in 2006 and used by millions of people and organizations to quickly share and discover information.




The word Twitter comes from the frequent chirping sound made by birds, hence the bird used in the Twitter logo. Users can access the site via the web and mobile devices to exchange frequent bite-size updates of information called ‘tweets’ which are messages of up to 140 characters long that anyone can send or read. These messages or tweets are public by default and visible to all those who are following the tweeter. 

Twitter allows you to follow other users you are interested in so that you’ll see their updates on your home page, which is an aggregate feed of all the accounts you’re following. Users share these tweets which are micro-bits of information that can contain things like photos, videos, quotes, article links and more. Each tweet can also have replies from other people creating real-time conversations around hot topics, breaking news and interesting new content.

Twitter was able to disrupt traditional point-to-point messaging systems like email by providing this one-to-many interface for rapid content delivery and search. But Twitter has evolved from more than just a real-time communication tool into one of the world’s leading sources of social discovery and newsworthy events. This open networking environment has also led to an entire ecosystem built around the Twitter platform coined the ‘Twitterverse’ where creative people, designers, marketers and businesses can flourish together.

The History of Twitter:
Twitter originally started off as a Podcasting company called Odeo before pivoting into the microblogging service we know and love today. If it wasn’t for Apple releasing podcasts via iTunes and scaring Odeo out the water, we might of never got Twitter!

Twitter Terminology:
The key to navigating Twitter is to master the lingo. The Twitterverse has it’s own set of vocabulary you’ll be sure to see flying around in tweets.

Tweet:
A standard message on Twitter containing 140 characters or less.

Retweet:
A tweet that has been reshared to all of a users’ followers.

Hashtag
The # symbol is used to tag keywords or topics in a tweet to make it easily identifiable for search purposes.

Mention
Tweets can include replies and mentions of other users by preceding their usernames with the @ sign.

Handle
This designates your username and accompanying URL at http://twitter.com/handle.

Feed
The stream of tweets on your Twitter homepage comprised of all the accounts you follow.

Lists
Twitter provides a mechanism to list users you follow into groups or curated lists showing tweets of all the users in the list.
Direct Message

Also called a DM, this represents Twitter’s direct messaging system for private communication amongst users.

How to Get Started on Twitter

1. Signing Up
First off pick a user name for your Twitter ‘handle.’ Make it short and sweet and preferably identifiable to you or your business. Refrain from picking any silly names unless you’re starting a parody account that is. Next you’ll want to add your bio information with a little bit about who you are and your interests to help people get to know more about you and whether they’d like to follow you. You can also include your location, website link and an avatar image which is a picture that will show up on your profile and next to all your tweets. Add some styling to your page with a neat background image, cover photo and theme colors. Also, you can check out 12 of the best Twitter tutorials of all-time!

2. Follow Sources
follow-after you sign up for Twitter you’ll be given some suggestions of popular users to follow. This is the first step in using Twitter as a discovery engine so start following interesting new people and sources. Some of the users you follow may eventually end up following you back too. At first Twitter doesn't know much about you so find familiar friends and brands to follow too, and overtime Twitter will make better suggestions to suite you. You can always unfollow people too that seem to be clogging up you stream with useless posts.

3. How to Post a Tweet
How to post a tweet You can post tweets of up to 140 characters. These tweets can also have media embedded like photos, videos or rich snippets from articles. Media can make your tweets more engaging, where photos generally get twice the engagement compared to regular text posts. Twitter also has a url shortener (t.co) automatically applied to shared links.

4. Retweets
retweetA retweet is the action of sharing another tweet again. People and businesses post messages on Twitter in hopes of getting as many retweets as possible to reach out to new audiences. Retweets represent 78% of user engagement with brands, with the other 22% coming from replies.

5. Connecting and Mentions
Direct messages Twitter provides a great way to connect with other users and monitor your interactions and mentions. You can also communicate privately with others users via Direct Messages if the other person follows you. Twitter also provides you suggestions on who to follow and other options to find friends.

6. Twitter Search and Discovery
Discover See what’s happening right now tailored just for you. Use the Discover tab to keep up with tweets, activity, and another source for new people to follow, find friends and browse through interesting categories like music, sports, entertainment, humor, technology and more.

7. Twitter for Mobile
twitter mobileTwitter’s mobile website allows you to have a consistent experience using Twitter on any smartphone or tablet device.

8. Tools and Apps
hootsuiteThere a ton of great apps and tools to enhance you Twitter experience and help manage potentially multiple profiles. These tools range from Twitter clients, scheduling, analytic tools, finding people to follow, bulk follow/unfollow features, automated tasks and more.

Some of our favorite social media management tools for Twitter include:
Hootsuite – http://hootsuite.com
Buffer – http://bufferapp.com
TweetDeck – http://tweetdeck.com
SocialOomph – http://socialooph.com
Tweepi – http://tweepi.com
SocialBro – http://socialbro.com
Followerwonk – http://followerwonk.com
TweetReach – http://tweetreach.com

9. Twitter for Business
Twitter is an unbelievable resource for businesses to grow their audiences, increase traffic and generate more leads. With over 400 million tweets a day and 200 million active users, people tune into Twitter to bring them closer to the things they care about. You should look to have at least a personal profile and a separate one for your business too! Having a great business profile gives your brand credibility on social media. 
Some best practices to be awesome on Twitter include writing good tweets, sharing relevant and interesting content and sharing other people’s stuff too. Twitter also offers promotions and advertising to get your business in front of even more fans. Every business website should also have 
Twitter buttons to share links and follow buttons to build their reach. And you can make your website or blog even more viral on Twitter by adding Twitter Cards to your site that make each tweet from your content show rich media like photos, galleries, summaries, videos, apps and more.

10. So What is Twitter Really About?

Twitter is basically the best way to discover new content and keep up with your favorite topics of interest and people. Twitter lets you exchange ideas and information instantaneously bringing folks together from all across the globe unlike ever before. Some of us use Twitter just to listen, others to keep in touch with friends. Tennis pro Serena Williams uses Twitter to follow updates from her favorite band Green Day. Musician Snoop Dog comically likes to wake up in the morning with baking updates from Martha Stewart’s latest recipes.

||Satnam Shri Waheguru Ji|| undocopy.com Friday, August 5, 2016
VMware Launches AirWatch Express to Speed Up and Simplify Mobile Device Management
 VMware, Inc. (NYSE: VMW), a global leader in cloud infrastructure and business mobility, today releasedAirWatch® Express™, a simple mobile device management (MDM) cloud solution designed to get devices up and running quickly. AirWatch Express makes it easy to configure devices with apps, email and Wi-Fi, while enabling the data encryption and security that is necessary in today’s environment. 

AirWatch Express delivers an affordable, consumer-friendly MDM built on the same platform as VMware AirWatch, the leading enterprise mobility management solution. With this simplified solution, more organizations globally can protect their company by securing their employee’s devices in just a few clicks.

“The transformative nature of mobility has cause the mobile endpoint to become the primary computing device for many businesses, and these same organizations are struggling to keep up with the device and app proliferation. The truth is managing mobile devices can be a timely and complicated process,” said Blake Brannon, vice president of Product Marketing, End-User Computing, VMware. “Without the need for technical knowledge or additional IT staff, AirWatch Express empowers organizations to support an ever increasing mobile workforce.”

Companies with smaller or no IT departments still have the same basic mobile needs as enterprises, and AirWatch Express is an affordable and intuitive solution that doesn’t require extensive set up or training to keep up with the fast pace of mobile technology. The cloud-based solution delivers an intuitive MDM experience and is available for iOS, macOS, Android and Windows 10.

AirWatch Express also takes into account the security risks associated with employees using their smartphones, tablets and laptops for work purposes. According to the 2016 Data Breach Investigations Report1, prepared by Verizon, the three most common mobile security breach incidents were a result of configuration or end user issues. AirWatch Express reduces these security risks by enabling companies to control these configurations, prevent data leakage, remotely wipe the device of work data if it’s lost or stolen, and more.

AirWatch Express is the start for an organization’s enterprise mobility program. When facing more advanced use cases, customers can simply upgrade to another AirWatch bundle to support an expanded business mobility strategy.

||Satnam Shri Waheguru Ji|| undocopy.com
LEARN:How does anti virus work?
Antivirus software uses several types of tests during scans and when running in the background.


Known threats are basically identified by a signature that matches an entry in the virus database your antivirus provider maintains on its end.

New threats are found by identifying a behavioral pattern - for example, a malicious software might try to change sensitive files on your computer, but attempts like this will be identified by your AV engine and you will be notified.

Antivirus refers to the traditional means of fighting computer malware. While hackers have become very much skilled and prolific in their spread of malware, conventional antivirus are being augmented with more advanced techniques and features. Antivirus software has become one component of security suites that offers multi-layered protection for computers.

An anti-virus software program is a computer program that can be used to scan files to identify and eliminate computer viruses and other malicious software (malware).

ALSO READ: DIFFERENT TYPES OF COMPUTER VIRUSES


Anti-virus software typically uses two different techniques to accomplish this:

Examining files to look for known viruses by means of a virus dictionary .

Identifying suspicious behavior from any computer program which might indicate infection.

Features of Antivirus Software

    Background Scanning:

Antivirus software scans all the files that you open from the back-end; this is also termed as on access scanning.

    Full System Scans:

This is done to make sure that there are no viruses present hidden on your system. Full system scans are also useful when you repair your infected computer.

    Virus Definitions:

Antivirus software depends on the virus definitions to identify malware. That is the reason it updates on the new viruses definitions.

Ways to get rid of viruses

  1.     Signature-based detection
  2.     Heuristic-based detection
  3.     Behavioural-based detection
  4.     Sandbox detection
  5.     Data mining techniques


Signature-based detection - This is most common in Traditional antivirus software that checks all the .EXE files and validates it with the known list of viruses and other types of malware. or it checks if the unknown executable files shows any misbehaviour as a sign of unknown viruses.

Files, programs and applications are basically scanned when they in use. Once an executable file is downloaded. It is scanned for any malware instantly. Antivirus software can also be used without the background on access scanning, but it is always advisable to use on access scanning because it is complex to remove malware once it infects your system

Heuristic-based detection - This type of detection is most commonly used in combination with signature-based detection. Heuristic technology is deployed in most of the antivirus programs. This helps the antivirus software to detect new or a variant or an altered version of malware, even in the absence of the latest virus definitions.

Antivirus programs use heuristics, by running susceptible programs or applications with suspicious code on it, within a runtime virtual environment. This keeps the vulnerable code from infecting the real world environment.

Behavioural-based detection - This type of detection is used in Intrusion Detection mechanism. This concentrates more in detecting the characteristics of the malware during execution. This mechanism detects malware only while the malware performs malware actions.

Sandbox detection - It functions most likely to that of behavioral based detection method. It executes any applications in the virtual environment to track what kind of actions it performs. Verifying the actions of the program that are logged in, the antivirus software can identify if the program is malicious or not.

Data mining techniques - This is of the latest trends in detecting a malware. With a set of program features, Data mining helps to find if the program is malicious or not.   

||Satnam Shri Waheguru Ji|| undocopy.com Tuesday, August 2, 2016