Windows 8 has launched and it is one of the most secure Windows operating system so far. However, it also raises certain security concerns for the user. Here are 8 security tips to help you secure your Windows 8.
1. Be careful with apps
There are certain apps that are completely re-written for the new Windows 8. As a result, they work a bit differently, though they look the same. For example, an application that was previously completely executable could now be entirely web based. This will impact the visibility of the existing security as well as the monitoring tools that is there for these apps.
2. The Windows 8 style UI version of Internet Explorer
The default settings in Windows 8, disables plugins. If you are a user that banks heavily on plugins, it can be a bit disappointing. This has been done majorly to avoid exploit kits and Blackhole attacks. If you are changing the default settings, then your Windows 8 security becomes vulnerable.
3. Your security product should flag malicious Windows 8 UI apps
Windows 8 UI apps are different from the regular applications and it is important that your security product should be able to distinguish between the two. The security product should select only the actual malicious Windows 8 apps and not the genuine ones.
4. Disable hard drive encryption hibernation
One of the important things to do to make Windows 8 more secure is disabling hard drive encryption. It is best to disable the hibernation option in Windows 8 through the group policy, as it does not always work well with encryption.
5. Your hardware should carry the “Designed for Windows 8” logo
If you have this logo, then you can take advantage of the secure boot functionality that is available in Windows 8. Secure boot is designed to make sure that the pre-OS environment is secure. It minimizes the risk from boot loader attacks.
6. Make application control a priority
Just visit the Windows 8 app store. It makes managing application quite easy and it is very important for both malware prevention and productivity control. Disable all apps that you don’t require any longer, so that no malicious apps slip through.
7. Put the same security levels on Windows RT devices
It is important that you impose the same security levels on Windows RT devices as all others. You should be able to track, control, remote wipe and encrypt them.
8. Run security suite
You should run a complete security suite for detailed filtering and centralized management and reporting. Though Microsoft has included a minimalist antivirus and firewall, it is better to go for an added security suite.
Above all, remain vigilant and quick.
The Pew Research Center’s Internet & American Life Project carried out a survey in April 2012 on the top four problems faced by cell phone owners in the United States. The study concluded that Smartphone owners reported more problems than other cell owners. To further funnel this, non-white cell phone owners faced all four problems at a higher weekly rates than their white counterparts.
Let’s look at the incidence of these four problems:
· Problem # 1: Dropped Calls
72% of cell phone owners in America experienced occasional dropped calls.
· Problem # 2: Unwanted Sales or Marketing Calls
Approximately seven-in-ten cell owners get unwanted sales or marketing calls at one time or another.
· Problem # 3: Unwanted Spam or Text Messages
Out of those who use text messaging on their cell phones, 69% receive unwanted spam or text messages.
· Problem # 4: Slow Download Speed
From those who use their phones to go online and do stuff like Internet browsing, online shopping, mail checking, and others, 77% of respondents say that they have experienced slow download speeds. The slow speed thus prevents things from loading as quickly as they would like.
Even if there are legal restrictions in the United States in making unsolicited commercial calls to mobile phones and sending spam messages, the findings point at their misuse. The incidence of unwanted intrusions is clearly on the rise. Understanding the guidelines correctly can help save the frustration.
Reading the fine line
1. People with commercial intent in mind cannot send spam to cell owners who have placed their mobile devices on the National Do Not Call registry.
2. Governmental regulations bar text messages sent from Internet domain names for those who are not in that registry.
3. Mobile-to-mobile spam messages are permissible with the provision that the text contacts were not generated through an automatic dialing system.
The study also correlated ethnicity with the problems faced by cell phone owners. Click the ‘Read More’ link to check the complete study.
Can we expect to see the ‘Home of the Future’ by 2020? Are we ready to embrace existing technology in our lives? Is there enough demand and infrastructure to facilitate the growth of technology? Researchers at the Pew Research Center’s Internet & American Life Project and the Imagining the Internet Center at Elon University got answers to many such questions in their survey. The online, opt-in survey covered 1,021 Internet experts, researchers, observers, and critics.
Technologists and corporate officials have already started work to plot the future. Cisco even predicts that there will be 25 billion connected devices in 2015 and 50 billion by 2020. But tech analysts have observed that people still find comfort in the familiar, simple systems to which they are accustomed.
Around 51% of the participants believed that we are coming closer to the foretold ‘Home of the Future.’ However, some 46% voiced the opposing view that the implementation of smart technology has failed because of its complexity, the lack of consumer trust, and bad economy among others. Survey participants also felt that the future predicted technological change is no more than just a marketing mirage.
Reasons for roadblock
According to Charlie Firestone, executive director of the Communications and Society program at the Aspen Institute, “Smart homes are on their way, but this development is being delayed. Not so much by lack of trust as by lack of alignment of the key players—utilities, ISPs, manufacturers.”
Donald G. Barnes, visiting professor at Guangxi University in China; former director of the Science Advisory Board at U.S. Environmental Protection Agency, wrote, “Barriers include the following: economic weakness, economic uncertainties, building codes, lack of standardization, lack of oversight/regulation (which actually leads to an atmosphere of business confidence), lack of tested, mature technologies, and resistance from entrenched technologies.”
After attacks by Zeus and SpyEye, it is the turn of Shylock Trojan to show its ugly head. iYogi cautions all readers as the malware has the capability to steal account credentials and exhaust all the funds of account holders. This time, the all-improved Shylock banking Trojan has been modified to evade detection.
The new variant of this banking Trojan, as detected by Symantec researchers, spreads through social engineering. With its new mechanism, the malware changes itself every time it gets downloaded and thus evades detection by signature-based antivirus programs.
According to Symantec, “These updates to Shylock are reported to be causing numerous problems relating to hidden files for Internet forum users."
Shylock exploits Java vulnerabilities. It seems to trick users into downloading by clicking on image files. As per Symantec, once the loader gets installed, it connects to a remote server and receives the Shylock hijacker. This hijacker then starts collecting information about the compromised PC and sends it to the command-and-control server. Shylock also gains additional capabilities by downloading a number of other components. "It spreads by replacing different types of document files, located in removable drives and network shares, with links to malicious executable files," Symantec said.
Capabilities of Shylock Trojan
The cunning thing about this malware is that it leaves no trail of its presence. Once it has successfully completed an attack, it uninstalls itself.
The following are the strengths of Shylock Trojan as per Symantec researchers:
· The malware can spread via removable devices
· It injects itself into a website, steal cookies, and obtain banking account credentials
· It can passively monitor user traffic or modify it in transit
Brief history about Shylock Trojan
Shylock Trojan was first detected in 2011 by researchers at Boston-based Trusteer. It mainly targeted banks in the United Kingdom, including HSBC, RBS, and Santander's U.K. The Trojan is named after a moneylender in Shakespearian novels who demanded a "pound of flesh" as penalty for an unpaid debt.Keep visiting this site to know more about such news and stay alert. iYogi always makes an extra effort to educate readers about various upcoming threats. In case you face any security issue in your computer, you can always get in touch with iYogi technicians for expert assistance available 24/7, 365 days a year.
What do bosses wish their team members knew without having to articulate it in quite so many words? You might be surprised, but quite a few things, actually. Most of them would stem from life lessons learnt from their own bosses. Some of them would have come the hard way, some by quiet observation. Why is this important? Because some of the most important pieces of communication are the ones that people never speak out loud, and bosses, however inhuman, are included in this classification. Yet most bosses would want you to have the benefit of their experience and knowledge.
Here are a dozen such bits of advice. No boss-speak, no corporate messaging, just heart-felt advice delivered in plain, sincere, one-on-one fashion:
1. Be better informed. I always want to know what you think. I value your honest opinion. But I wish you read more and were more aware, so that your opinion would be better informed and I could count on it more. It’s keeping track of information, trends and happenings combined with your perspective on them that makes your opinion knowledgeable and valuable to me. One without the other is just that – a half-opinion.
2. Take pride in your work. I want to set you up for success, always. But I wish you would take more pride in your work. I wish you not be so easily satisfied but rather, compare yourself to the world’s best and see where you lack. I wish you demanded more of yourself, set your standards higher and delivered the best job you are capable of.
3. Opt to be an owner. You want more responsibility and that’s great! But there is one thing that you need to remember when I give you a job. It’s called ownership. When I give you a critical assignment, I wish you would drive it. I wish you would think about it on your own time. I wish you would dream about it. That’s being an owner. Those are the kind of people that are hard to find in this world. Be one. And I promise you’ll always be in demand.
4. Take criticism positively. I wish I could criticize your work without you becoming defensive. My opinions are never directed at you personally. It’s always about getting the best work out there. That’s part of growth.
5. We’re on the same side. Occasionally, I wish you would see things from my perspective. I may be your boss but I too, am accountable. I can’t always deliver things you want, in a jiffy. Especially the biggies that impact organizational policies and structures. I need permissions too. I can’t always see things from just your perspective, I have to map things against a larger point of view than just yours or mine. It’s not about what you or I need; it’s about what the business needs.
6. Fun is the job. I never want you to lose that gleam in your eye. It’s that ‘happy-at-work’ sign that tells me I am doing my job well. I want this job to be the challenge that takes your career ahead. I want you to like me and remember me, even after you move on to another organization. I’ve had some great bosses and the reason I try to be one is that I owe them big.
7. Mediocrity is expensive. I know that the common belief is that achievement comes at a price. Late nights, acid burn from too many pizzas, irate partners, guilt from the let-down expressions on children’s faces; this list is apparently long and endless. But I wish you knew that there is a price you pay for mediocrity, too. A fact no one tells you. And there is nothing romantic about consistent failure, which is what mediocrity really is.
8. Recognition comes after performance. I want you to realize that there is no such thing as a promotion. Every promotion is actually a validation of a role you are already doing. So if you want a promotion, do keep this in mind and the promotion will follow.
9. Name it, you have to earn it. Everything in the workplace is earned. Trust, faith, respect, status and money. You need to earn it all. And that needs hard work and determination. You can’t grudge the effort that goes into making a career.
10. Practice gratitude. While the effort you put in is critical for your success, do be appreciative of your organization and the opportunities it gives you, your colleagues and the support they provide, and hey, once in a while you can even thank me. In between the carping, the demanding, the kicking and the screaming, that is. Being grateful keeps you grounded.
11. Success is a choice. There is no such thing as work-life balance. It’s a myth. Don’t read what people write and talk about – watch what achievers do. They are single-minded to the point of wearing blinkers. They are focused and nothing gets in their way. They have no desire for balance – work is their life. Their chosen life. Success is a choice.
12. Act now. We all have to make choices – so do you. How important is work to you? If it is, then the choices come easy, without complaining, without teetering on the fence. I wish you would make yours and then get on with living them. It’ll make your life easier. And mine too.
Computer peripherals are devices that are used in conjunction with a computer to accomplish various tasks such as playing audio/video files, generating hard copy of documents or images, giving input commands, and many others. Peripherals can be used internally, such as a DVD-ROM drive, or externally, such as a keyboard, mouse, speaker or printer. Software giant Microsoft has unveiled recently some peripherals that would be compatible with its upcoming Windows 8 operating system. The peripherals include a new line of mice and keyboards that are specifically designed to work and play with Windows 8.
iYogi highlights here the features of the new lineup of Windows 8-friendly peripherals that include two new Bluetooth-enabled keyboards, the Wedge Mobile Keyboard and the Sculpt Mobile Keyboard, and two Bluetooth-enabled mice, the Wedge Touch Mouse and the Sculpt Touch Mouse. All these newly released peripherals are designed keeping in mind the Metro User interface of Windows 8 in mind.
Wedge Mobile Keyboard: This mobile keyboard is built for use with Windows 8 tablets. This ultra-slim and full-sized touch keyset keyboard will be easy to carry. It comes with a cover to solve dual purpose of protecting the keyboard from scratches and as a tablet stand. The keyboard also includes some of the most commonly used features such as Windows 8 Hot Keys and built-in media keys.
Sculpt Mobile Keyboard: This mobile keyboard is very thin. It sports a Comfort Curve design, encouraging natural wrist posture with a slight, six-degree curve. The on/off switch on the keyboard prolongs the battery life of the keyboard by up to 10 months. A two-color battery life indicator warns the users when it is time to replace batteries. Other features of this peripheral include Bluetooth connectivity, and Windows 8 Hot Keys to quickly search, share or access devices, settings and the Windows Start screen.
Wedge Touch Mouse: This mouse is compact enough to fit into a user’s pocket. It features four-way Touch scrolling and navigation, BlueTrack Technology for use on any surface, and battery-saving technology which powers down the peripheral and puts it into sleep mode along with the computer it is connected to.
Sculpt Touch Mouse: This Windows 8-compatible peripheral features a four-way touch scroll strip (instead of a mouse wheel) for smooth and easy navigation. With a simple finger swipe, Windows 8 users can easily navigate up and down, left and right, and through applications and documents.
All of these peripheral devices will be available on or around the Windows 8 official release date of October 26. Till then keep yourself updated with iYogi to know more about the latest peripherals and devices related to Windows 8. If you have not yet experienced the wonderful features of Windows 8, contact iYogi technicians for assistance regarding installation of Windows 8 Release Preview on your machine.
The twenty first century has brought with it a spike in entrepreneur-driven startups, especially among the tech world. A good number of these fail while a modest number succeed and, though not always the case — for sometimes the idea or product is to blame —, usually the downfall of a startup begins with a critical structural fault in the makeup and protocol of the startup’s team.
It is crucial, then, that the team you assemble to rise up your startup from the dust and to attract investors by the hundreds be carefully selected, groomed, and cared for. Much like an expensive clock that will hang in the foyer for all your guests to see, your team must be built so that it meshes together beautifully while maintaining functionality and timeliness. It must be lubricated from time to time to ensure the continuity of its integrity. Here’s how you can do that.
1. Be a respectable leader
As made apparent by countless inspirational box office hits, the quality in collaboration that your team exhibits varies directly with the quality in leadership that you exhibit. Be a strong leader, then. Lead by example, get involved with your team, encourage them to work together, facilitate creativity, congratulate members when due and discipline them when due and without partisan.
This — good leadership — is key to an efficient, vibrant team. Everything else just helps.
2. Choose your members wisely
A team should be wisely weighted and consistent of specialists from each aspect the team will be handling. Cut employee expenses and hire multitalented members; a programmer to build an app who can also market it well. To back these specialists up, have a few interns and generalists to bring the coffee, fax the papers, handle accounting, etc. It’s also important to not hire too many specialists for a field that requires only a few; over saturation means that you pay more for employees who will become lazy and dependent on the few who excel.
3. Reward performance
Depending on your budget, you can offer rewards to individual employees ranging anything from a free cruise to drinks on the boss at the nearest happy hour. This creates a friendly sense of competitiveness and boosts your team’s morale. Don’t just stop at individual prizes, though; throw an office party every once in a while or buy the whole team pizza on one of those late-night workdays.
You’ll gain admiration, respect, and diligence from your team in return. Plus there’re the good times you’ll all have, which ties in directly with this next point…
4. Be a family
Especially if your team is a small one, encourage closeness and personal relationships among team members. True, professionalism is valued, but humans, by fact, work harder when they care more about what they are working on. Employees who care about each other, then, will work harder for each other. It’s simple. Besides, would you rather trust with your business — a neatly written resume or a close friend who you know will not let you down? Exactly.
Chris Lake of Econsultancy wanted to find out the most common reason why people unfollow someone on Twitter. So far, more than 765 votes have been cast since on the survey he posted— and the results are interesting to say the least.
Here are the top ten reasons why people hit the unfollow button in ascending order of dislike.
1. Keep posting Foursquare updates
Seriously, no one wants to know that you’ve just appointed yourself the mayor of your restroom on Foursquare. Neither are most people interested in a detailed analysis of how many calories you burnt today. A substantial number of Twitter users find this activity annoying enough to hit the button.
How to fix: Turn off Foursquare and other automated app updates on Twitter
2. Keep begging people for stuff
Sending a tweet requesting people to like your Facebook page once may be okay. Individually sending everyone you follow links to read your blog post or listen to your music on SoundCloud? Not so much. If you keep doing it, you’re leaving the other person no choice but to unfollow you as a hint.
How to fix: Go about your business on the web, don’t be a cling on
3. Tweet only once in a fortnight
Out of sight and out of mind is right. Most people won’t even follow an inactive or sparsely updated account in the first place. This isn’t blogging where you can afford to make one appearance a week. This is continuous stream of thought. You’re either on the wagon or off it.
How to fix: Be consistent, get a mobile client and keep in touch with the network
4. Pick fights and post nude images
Constantly picking up arguments with people, posting links to inappropriate images or media, or being incessantly abusive isn’t something that will win you the favor of most people on Twitter. They may tolerate you for a while, but if you make offending sensibilities a habit, people will make blocking you theirs.
How to fix: Keep it clean, if you can’t, go to 4Chan
5. Keep ranting about the same thing
Sounding like a broken record will have people dropping you faster than a hot pan. It’s good to tweet about sports if you’re really enthusiastic it, but if that’s all you’re going to do 24/7, you’re really going to limit the number of people who might potentially follow you. Similarly, ranting on about how your ex broke your heart all the time probably suggests you need a counselor more than a Twitter account.
How to fix: Inject a little variety in what you tweet
6. Be spammy and automate your tweets
Services like Twitterfeed have made it easier for people to share their interests automatically. Once the feeds are set up, you don’t have to do a lot as your account will be automatically updated. While this may be a good practice to promote your own blog; if you have too many feeds connected, you look like a bot.
How to fix: Stay human, don’t use auto tweeting services
7. Tweet about really mundane things
You may think that your cats are really interesting, but everyone may not agree with you. If you’re consistently bland and boring, chances are high that you’ll never get people interested enough to follow you, and the ones who have will probably soon reconsider why they did.
How to fix: Be funny, share the uncommon and not the everyday
8. Get on a 24/7 self promotion trip
This is good only in moderation. What’s the point of being on a network if you can’t benefit from it in anyway, right? But done too frequently and with too much enthusiasm may leave a bad taste in the mouth of others. Despite what it may seem, no one really likes self-absorbed quack jobs.
How to fix: be interested in others, don’t go on and on about yourself
9. Oversharing and TMI
It’s probably a better idea to vent elsewhere and not on Twitter if you had a bad day. Divulging too much information about your personal life usually comes across as emotionally unstable behavior to people online, that is other than the bigger issue of putting your privacy at risk and making yourself vulnerable.
How to fix: Keep your personal life personal
10. Send a tweet every 10 seconds
Where tweeting too less makes you invisible, tweeting too often makes you visibly annoying. Not only are you clogging everyone’s timeline all the time, you’re probably coming across as a marketing bot. Of course, no one’s going to ask you to get a life, they’ll just unfollow you.
How to fix: Stay relevant, don’t overdo it
Hello! It’s Monday and from iYogi family we are wish you all a great week ahead. As you all know we have a Youtube channel, and it is design to help users on basic computer problems. Here we encourage users to try simple troubleshooting steps on their own. Recently we have made some changes on our Youtube channel http://www.youtube.com/user/iyogi we would love to hear your feedback so, please have a look and comment. Thanks! Good Karma!
Travelling can be quite a painful experience if you let it. After all going away from the comfort of your home and city can be quite troubling even if it is just for a few days. There are a thousand things that can go wrong probably they do. If you think that it canÔÇÖt happen to you think again.
This article by Inc. will help you travel smarter with the help of the permanent resident of your trouser pocket, your smartphone. Here are the 5 tips
When you are out of town on a business trip the chances of losing something critical are very high. Especially, your travel info such as the boarding pass or even your hotel information. So make sure you have multiple copies with you; one hard copy and a couple of soft copies to your mail or message inbox and one on a cloud platform such as DropBox.
Your iPhone or Android smartphone has an amazing feature called the camera, so use it. This is possibly the best way to keep track of your receipts; click and upload on to DropBox or you can even use NeatMobile. This way you will not have to dig through the bowels of your house when itÔÇÖs time to file in your reimbursement claim.
Most business travelers tend to forget their tablets or laptops in cabs and that is the biggest blunder you can make. So make sure you feed all the information about the cab including the license plate number, cab company and driverÔÇÖs name into Evernote or such. That way even if you forget your phone in the cab you can still access the info.
Get this app called FlySmart and it will give you all the information you need including Flight schedules, live updates and shop listings in over 60 airports. So you can wave the useless signage at airports goodbye which lead you nowhere when you are hungry or just want something to read.
Well, thereÔÇÖs no case here really. Smartphones of today like the iPhone or the Samsung Galaxy come with an in-built GPS system, Google maps that can guide you in all your road trips. But the app called Waze will give you voice guided navigation and update you on traffic conditions and the chosen route. You might want to consider adding this one.
So you have successfully converted your smartphone into your travel agent cum tour guide. Congratulations.
Lately, there has been a lot of fake antivirus program running on the Internet. PC users are tricked into buying fake antivirus programs by online scammers. The recent finding of fake antivirus is the Vista Antivirus 2012. According to security experts, scammers are operating the same fake Vista Antivirus 2012 program by two different names — Win 7 Antispyware 2012 and XP Security 2012.
Sources have it that once the bogus Vista Antivirus 2012 gets into the system; it cannot be uninstalled using the system ‘Add/Removal’ tool. However, Enigma Software Group has released a report on how to easily remove the fraudulent Vista Antivirus 2012.
According to reports, the counterfeit Vista Antivirus 2012 was designed in such a way that the look and interface were similar to the genuine one. The fake antivirus mislead PC users by giving false alerts of malicious threats and even blocking web browsers from accessing antivirus websites. Users were later misguided into buying Vista Antivirus 2012 by displaying false security warnings, saying that their system are at risk. This way, the scammers earned their money by tricking PC users.
Online scammers promote their fake antivirus programs in two ways:
1. Fabricated antivirus scanners on the Internet. When users scan there PC online, it shows false security warning and asks users to download files that will help them in removing the malicious worms in their system.
2. The other way is through hacked websites. When you visit such websites hacked by scammers, the fake antivirus program gets installed on your system automatically without your permission.
There are lots of phony antivirus programs running on the Internet in different names, so keep an eye when you scan your PCs online. Some of the forged names are — XP Security 2012, Vista Security 2012, Win 7 Internet Security 2012, and lots more. The list is never ending.
If you are planning to buy a printer then go nowhere. We have compiled some of the most important and yet simple points that you need to check before zeroing on a printer. If you have doubts regarding the type of printers, iYogi Experts can be of great help. iYogi has come up with simple key points that can help you in getting the right printer according to your needs..
Finalizing the best printer that will suffice all your needs can be mind boggling. It’s not the matter that there are few printers available to satisfy your need, but the matter of fact is that the market is flooded with excellent printers. One of the most basic questions before buying a printer is to identify the need for having a printer. It will be a silly decision to go for an expensive high-performing printer if you just need it for home use, and vice versa. Other question can be the quality of printout that you need to have while printing your documents. The requirement varies a lot depending upon your need, like a photographer will need one that can give finer details for every pixel, while in a corporate environment all that they need is clear printing of the documents in the least time.
If you like to print paper, charts, and photographs, you can go for the color inkjet printers. These are typically suited for home users. In case you want fats printout and that too with sharp clarity, laser printers will work for you. Laser printers are comparatively cheaper and give a large bulk at one go.
You should also think about the amount of space that you want to invest in storing a printer. A super large printer at your home is certainly not going to look good. Invest in the type according to your usage and the space you have.
The other things among many others that need to be considered before buying a printer is that whether the printer prints slow or fast, what is your daily requirement for printouts, what size of pages would fit into the printer and above all what will be the cost factor in getting the prints.
You need to point out your preferences and match the same with the available options to get the most compatible and affordable printer for your needs.
If you have any query, you can call the experts at iYogi and know the solution of your problem. iYogi Technicians can also fix the problem with your printer and other peripherals. The iYogi Experts are available 24x7.