Sunday, August 30, 2009

Windows Ubantu

Ubuntu is a community developed operating system that is perfect for laptops, desktops and servers. Whether you use it at home, at school or at work Ubuntu contains all the applications you'll ever need, from word processing and email applications, to web server software and programming tools.

Ubuntu is and always will be free of charge. You do not pay any licensing fees. You can download, use and share Ubuntu with your friends, family, school or business for absolutely nothing.

Ubuntu is designed with security in mind. You get free security updates for at least 18 months on the desktop and server. With the Long Term Support (LTS) version you get three years support on the desktop, and five years on the server. There is no extra fee for the LTS version, we make our very best work available to everyone on the same free terms. Upgrades to new versions of Ubuntu are and always will be free of charge.

he graphical installer enables you to get up and running quickly and easily. A standard installation should take less than 25 minutes.

Once installed your system is immediately ready-to-use. On the desktop you have a full set of productivity, internet, drawing and graphics applications, and games.

On the server you get just what you need to get up and running and nothing you don't.

Download Windows Ubantu Desktop Edition

Download Windows Ubantu Server Edition

AGENT

fob_thumb_detail_agent Rockstar Games is proud to announce Agent. Developed by the people behind Grand Theft Auto, Rockstar North, Agent will be available exclusively for the PLAYSTATION®3 computer entertainment system.

Agent takes players on a paranoid journey into the world of counter-intelligence, espionage and political assassinations during the height of the Cold War at the end of the 1970's.

 

 

 

COMING SOON……

Grand Theft Auto : Episodes from Liberty City

fob_thumb_detail_episodesfromlibertycity

     Grand Theft Auto: Episodes from Liberty City includes both The Lost and Damned and The Ballad of Gay Tony together on disc exclusively for Xbox 360® video game and entertainment system from Microsoft.

    Grand Theft Auto: Episodes from Liberty City will be available worldwide October 29th 2009 for $39.99 and will not require a copy of the original Grand Theft Auto IV to play.

Grand Theft Auto: Episodes from Liberty City Trailer Coming 09.01.09

 

COMING  SOON……October 29th 2009

MAX PAYNE 3

max-payne-3-20090323103456977-000  max_payne_3_logo

1 2

3 4

COMING SOON…..

Saturday, August 15, 2009

WALKMAN® MP3

Walkman

 video_mp3_walkman  pdt_cat_W_series

Learn More About WALKMAN® MP3 Players

Walkman's quartet of sound enhancement technologies delivers clarity of original sound.

  • Clear Bass

  • Clear Stereo

  • Digital Sound Enhancement Engine (DSEE)

  • Quick Charge Technology

  • Superb Battery Stamina

  • Noise-Cancelling Function

  • Drag-and-Drop Transfer

  • 13.5mm Driver Units

  • Bluetooth™ Wireless Technology

Searching for your favorite song has never been easier and more fun! With the press of a button, ZAPPIN™ enables you to “ZAP-in” to preview the chorus of the next track with a choice of either 4 or 15 seconds, making it easy to browse and find the track you want. Found your tune? Simply press the button again to “ZAP-out” to start playback from the beginning.

Saturday, March 28, 2009

FIREWALL Internet Security

The biggest reason for installing personal firewall software is to prevent identity theft and the lengthy process of restoring your credit. Your financial data and password lists are all stored inside your computer, but a novice hacker could easily get into your system to copy these without detection. Think of it this way - a firewall is to a computer, as a security system is to a home. A firewall, like a security system only allows specified traffic through specified doors (ports). A personal firewall product will alert you if anyone ever tries to tamper with the doors on your computer. You decide who can visit and who is not welcome.


Make a great Firewall


A personal firewall is software designed for use on a single PC. Personal firewalls lock out intruders to keep your individual PC safe, at home or at the office. If you're shopping for a firewall to protect your computer, you've come to the right place.


Feature Set –A personal firewall should offer features that go beyond standard protection. The bare necessities include keeping your system hidden and keeping uninvited people and programs out. The best firewalls include tools to manage spy ware, cookies (software outsiders put onto your computer) and viruses. Some firewalls offer Internet filtering to restrict content viewed in your home.


Ease of Use –A computer novice should be able to understand and use the firewall product without help. The control panel should be intuitive and convenient. We’ve reviewed a few advanced firewall products that are powerful tools, but inappropriate for novices. When we include one of these products we note this in the “Ease of Use” section of the review.


Setup Ease –Installing personal firewall software should be simple and fast, even for a computer novice. Your personal firewall should not be so finicky that it requires you to uninstall other programs before it will function. And your firewall should be compatible with any typical operating system.


Reliability – The least a firewall should do is to keep intruders out and keep your system stealth (well hidden) online. The firewall should keep your IP address and browser hidden while you browse the Internet in stealth mode. This means that others should not be able to see your computer or personal identity unless you allow them to see these. Your personal firewall should do its job consistently, without clashing with your other software.


Support – The firewall software should give enough instruction for a computer novice to set up the product without help. The manufacturer should also have help online to answer common questions.

Help Documentation – Is there a help document available? Is the help section well-written with easy-to-understand without confusing technical jargon? Can you find your answers fast?

SPYWARE & MALWARE Internet Security

No longer something that you only see in secret agent movies, Spyware can attack anyone who visits corrupt websites, clicks on deceptive popups or views a spam email message–simply put, if you're online, you're at risk


Make a Great Anti - Spyware


Below we highlighted the attributes that we at Anti-Spy ware Software Review consider to be the most important when purchasing spy ware and adware detection and removal software.

Feature Set – Does the anti-spy ware include tools to enhance the ease of spy ware detection and removal? Does the software offer descriptions of detected spy ware so you can determine whether or not you want to keep each item? Are there auto-update and auto-scheduling capabilities available to save you time and keep you up-to-date and protected? Are there "undo" capabilities in case you accidentally delete something you actually need?

Effectiveness– Does the product provide real-time protection from spy ware preventing its installation instead of just removing it afterward? Is the product effective at finding and removing the many different types of spy ware and adware? Does the manufacturer keep their product up-to-date with new spy ware definitions?

Ease of Use – How easy is the product to use? Can you quickly find the features you are looking for? Are the descriptions easily understood or do they assume you know all the appropriate jargon? How quickly does the software perform the scan?

Customization – Can you target select portions of your computer to save on scanning time? Are there other options available to accommodate different needs, such as opting out of removal of certain items, or scanning to remove spy ware that alters your Internet settings?

Ease of Setup / Installation – Is it easy to download and install the product? Can you get it up and running without consulting a book or a tech support person?

Help / Support – Is there a Help section installed with the product? Is it easy to find answers to your questions? Is there someone you can call for support? How quickly does the support staff respond to your email questions?

Friday, March 27, 2009

MAIL ANTI SPAM Internet Security

Make a Great Spam Filter


Even though the perfect Spam Filter does not exist in today's marketplace, there are a number of great solutions depending on the users email needs. Here is a list of what we at Spam Filter Reviews feel are some of the best attributes of Spam filtering software.


Ease of Use - Is the product easy to install? Is it easy to setup all of the email filtering rules? Is it easy to use?


Effective at filtering - Does the spam filtering software have a good balance of being able to filter spam and yet allow valid emails to come into your inbox? The ability to customize sensitivity of spam filtering is important as well.


Email Processing Steps - Does the spam software allow you to retrieve your email in the same manner as you did before you installed the product? A good spam filter should not require you to perform an additional step to filter your email.


Allow/Blocking of Email - You should be able to specify what email you want to appear in your inbox. Does it allow you to block or allow email based on the senders email address, IP addresses, server or domain addresses, or country of origin.


Content Categories - Most people have a difficult time of expressing what is spam and what is not spam, but they definitely know spam when they see it. What is spam to one person might be a treasured email to another. Spam filters should include the capabilities to specify the allowing or blocking of spam with content categories. General categories might include pornography, financial, services, health, insurance, adult, games, gambling, etc. Categories allow you to easily identify and specify what should be allowed or blocked, especially if you don't know who the sender is.


Rule Creation - Does the spam filter allow you to easily define and customize certain rules. These rules might be in conjunction with allow/block lists or allow/block categories. Does the product allow you to easily incorporate a new rule once an allowed email is identified as spam?


Quarantine Area - A great spam filter should provide a quarantine area where all blocked email is stored. This allows you the opportunity to retrieve email that may have been inadvertently blocked. The quarantine area should not have to burden you with any additional email processing functions and should automatically clean itself with old unwanted emails.


Worst of the Spam - Sporn - How well does the email filter support the blocking of sporn or spammed pornography? Does it allow you to block all pornography and/or adult themes? Does it allow you to view quarantined email without viewing any of the pornographic images?

Monday, March 23, 2009

Protect Your IP

YOUR IP ADDRESS IS PUBLIC


Accessing the Internet is a security risk.


When you are connected to the Internet, an IP address is used to identify your PC. If you don't protect yourself, this IP address can be used to access your computer from the outside world.


A fixed IP address is a larger security risk.


If you're using a modem with a dial-up connection, you will get a new IP address every time you connect to Internet.


With an ADSL or cable connection users sometimes keep the same IP address for several months, this represents an increased security risk.


If you have a fixed IP address, you give potential Internet crackers all the time they need to search for entrances to your computer, and to store and share (with other crackers) information they might find about your unprotected private data.


Your Network Shares


Personal computers are often connected to a shared network. Personal computers in large companies are connected to large corporate networks. Personal computers in small companies are connected to a small local network, and computers in private homes often share a network between family members.


Most often networks are used to share resources like printers, files and disk storage.


When you are connected to the Internet, your shared resources can be accessed by the rest of the world. A Common Windows Security Problem


A Common Windows Security Problem


Unfortunately, many Microsoft Windows users are unaware of a common security leak in their network settings.


This is a common setup for network computers in Microsoft Windows:

  • Client for Microsoft Networks* File and Printer Sharing for Microsoft Networks
  • NetBEUI Protocol
  • Internet Protocol TCP/IP

If your setup allows NetBIOS over TCP/IP, you have a security problem:

  • Your files can be shared all over the Internet
  • Your logon-name, computer-name, and workgroup-name are visible to others.

If your setup allows File and Printer Sharing over TCP/IP, you also have a problem:

  • Your files can be shared all over the Internet

Computers that are not connected to any network can also have dangerous network settings because the network settings were changed when Internet was installed.


Solving the Problem


For Windows 2000 users:

  • You can solve your security problem by disabling NetBIOS over TCP/IP:
  • Open Windows Explorer
  • Right-click on My Network Places
  • Select: Properties
  • Right-click on Local Area Network
  • Select: Properties
  • Select: Internet Protocol TCP/IP
  • Click on Properties
  • Click on Advanced
  • Select the WINS tab
  • Select Disable NetBIOS over TCP/IP
  • Click OK

If you get the message: "This connection has an empty......” ignore the message and click on YES to continue, and click OK to close the other setup windows.


You should restart your computer after the changes.


For Windows 95, 98, or ME users:


You can solve your security problem by disabling NetBIOS over TCP/IP:

  • Open Windows Explorer
  • Right-click on My Network Places
  • Select: Properties
  • Select: Internet Protocol TCP/IP
  • Click on Properties
  • Select the NetBIOS tab
  • Uncheck: Enable NetBIOS over TCP/IP
  • Click OK

You must also disable the TCP/IP Bindings to Client for Microsoft Networks and File and Printer Sharing:

  • Open Windows Explorer
  • Right-click on My Network Places
  • Select: Properties
  • Select: Internet Protocol TCP/IP
  • Click on Properties
  • Select the Bindings tab
  • Uncheck: Client for Microsoft Networks
  • Uncheck: File and Printer Sharing
  • Click OK

If you get a message with something like: "You must select a driver.........” ignore the message and click on YES to continue, and click OK to close the other setup windows.


If you still want to share your Files and Printer over the network, you must use the NetBEUI protocol instead of the TCP/IP protocol. Make sure you have enabled it for your local network:

  • Open Windows Explorer
  • Right-click on My Network Places
  • Select: Properties
  • Select: NetBEUI
  • Click on Properties
  • Select the Bindings tab
  • Check: Client for Microsoft Networks
  • Check: File and Printer Sharing
  • Click OK

You should restart your computer after the changes.


Protect Your Server


iisPROTECT provides a complete range of password protection, authentication and user management solutions:


iisPROTECTasp: Protect areas of your web site and require username and password. Grant/deny any users/groups on a per resource basis. Extensive Web Interface for user/group admin, use any DB backend, store custom data, set user start/end dates, email users, audit logins.


iisPROTECT: Protect all web site files including images, databases, html, ASP etc. Protect entire directories, users / groups independent from Windows accounts, complete web administration, does not require cookies or any programming. Complete turn key solution.


iisPROTECTquota: All of the features of iisPROTECT plus: prevent concurrent logins and password cracking attempts, set quotas on hits, logins, and kb per user.


Read more about iisPROTECT.

HTML Made Really Easy

HTML is very easy to use; it was designed that way. You don't have to be a programmer to use it. If you can edit a text file, then you can write HTML (and if you can write email, you can edit a text file). If you tried to learn before and couldn't, then someone wasn't telling you the right things.


This tutorial will explain the structure of HTML quickly and clearly, and show you through examples the practical things you need to know, so you can be making your own pages soon (like, this afternoon). The whole tutorial is about 14 printed pages, but you only need the first four or so to be off and running.


In this tutorial, you'll create small pages and view them. There aren't really any "required" exercises, but you should play with new concepts until you're comfortable with them. If your browser supports frames, fire ups this HTML Test Bed (non-frames version), where you can type HTML in one frames and sees the resulting page in another. Resize the input and output frames/windows for best viewing.


If your browser doesn't support frames, or when you're making real pages, you'll want a real text editor. Start up Teach Text on the Mac, pico in UNIX, or Notepad in Windows, or a better one if you have it (here's a directory of text editors at Yahoo). Give your HTML files names ending in ".html" (or ".htm"). Use your browser to view the HTML files you create, with the menu command "File/Open File" or something similar; use the "Reload" function after each change.


OK, Ready?


What is HTML?


Although HTML stands for Hypertext Markup Language, it's not really a programming language like Java, Perl, C, or BASIC-- it's much simpler. It's a way of describing how a set of text and images should be displayed to the viewer, similar in concept to a newspaper editor's markup symbols.


Anatomy of a Web Page


A Web page consists of an HTML file, plus any image (picture) files used on the page. The HTML file (a normal text file) contains all the text to display, and also acts as the "glue" to hold the text and images together in the right places, and display them in the right style.


Writing an HTML file means composing the text you want to display, and then inserting any tags you want in the right places. Tags begin with a <> character, and tell a browser to do something special, like show text in italic or bold, or in a larger font, or to show an image, or to make a link to another Web page. Although HTML has many tags you can use, you don't need to know them all to use HTML-- you can get by with just a handful.


One great thing about learning HTML is that you can see how everyone else has done it, by looking at their source code. You can see the HTML source of any page you're viewing. Try it now: In Netscape, use the menu command "View/Document Source". Other graphical browsers have a similar menu item, maybe under "File/" or "Edit/". In Lynx, the backslash key toggles the source code view on and off.


View lots of source code. View the source code of any page that makes you wonder how they did something. Everyone who uses HTML has learned it by reading other people's HTML code-- the Internet is a big, mutual-learning community thing.


You don't need an "HTML editor" program to write HTML. Some people like to use them, and that's fine, but many pros and beginners prefer to use a plain text editor and insert the tags themselves, as we're doing here. To each their own.


Anatomy of an HTML Tag


Tags have a simple structure. They begin with a <> character. Between the <> characters are the tag name, and maybe some attributes, depending on the tag. Most attributes take a value too. Some attributes are required, and some are optional. The general form of a tag is


Tag names and attribute names are not case-sensitive, but some attribute values are. The tag name must come first, but the order of the attributes doesn't matter. So you could also write this tag as:


Different people write them different ways; do whatever you're most comfortable with.


There are many different tags to do many different things. For example, use the tag to show an image on your Web page:


Is rendered as


This means "show the picture blueribbon.gif at this place on the page." Note that the src attribute gives the URL of the image file, either a relative or absolute URL. The above example using an absolute URL would be: