Security in a BYOD World.

February 6, 2013 Leave a comment

Within the next few years the BYOD concept will become widespread and generally accepted ( I think this is long overdue) – basically due to the operation cost reduction it presents to businesses. This will indeed increase the security burden on CIOs and may prove to be a really hot headache if the strategy is not right.

This webcast deals with this in a light that will dazzle you. Enjoy! Hmmmm… and i think Webroot mobile security suit is not bad – though not a total solution in my opinion.

Please click https://www.brighttalk.com/webcast/288/65745 to view. Please don’t forget to return here to leave a comment.

Categories: IT Security

Windows 7 Shortcuts

October 15, 2012 4 comments

The Document above shows all available shortcuts usable on the Windows 7 Operating System. Increase performance and turn around time for your deliverables by using shortcuts instead of the boring mouse clicks. download and enjoy!!!

Finding The Right PC for You

September 17, 2012 Leave a comment

English: Acer Aspire

When it comes to buying a  Computer, you want to get the absolute best. Of course, if you are like   most  of us, you don’t really have the cash for the computer of your dreams.  In fact, you are going to be lucky if you can afford one at all.  If you can find the money for a computer, there are a couple of things that you will want to consider before you make your purchase.

Laptop or Desktop

Now that laptops are becoming increasingly more capable, fewer and fewer people are opting for the desktop computer.  That doesn’t mean that a laptop is the perfect thing for you.  A laptop can provide great portability, but it comes at the cost of memory, processing power and screen-size.  Depending on what you will use your computer for, you may find that a desktop computer is better(though mobility is everyone’s dream!).  If price is  really important, you might look into a portable piece like a tablet to bring to class paired with a cheaper desktop in order to avoid sacrificing the function that you need for price.

Screen Size

Bigger is better, but it is also a lot more expensive.  Bigger screens are also not necessary for reading online papers for class.  Those big screens can also effect your body’s biological clock.   With smaller screens you are going to run into other problems – you might have a difficult time seeing what you are working on.  It is important to remember why you are buying the computer.  If you only need one for classes, it might be a lot easier to tote it around if it has a smaller screen. It is worth noting that screen resolutions are measure in DPI(dot per inch),DP(Dot pitch). The higher the value the higher the display’s resolution.

Memory/Speed

The fastest, smartest computers are always the most expensive.  Of course, cutting costs on things like screen size and accessories can cut down the cost a little, but in the end, the bigger your computer’s brain, the more costly it is going to be.  To get enough memory, you may eventually find yourself needing a desktop.  If you use a lot of file space on your computer for programs, videos, and photos, you might need all of that space to keep your computer running.  If you are worried, look into the price for an external memory bank. it is worth noting that the term memory in the computing world is used interchangeably between the Hard drive and the RAM. Since this article’s intenstion is not to bore you with technical terms, it is worthy to note that when talking speed of processing more attention should be given to RAM size but when talking about permanent storage, more should be given to Hard Drive space.

Additional Gear

What computer would be complete without all of its accessories?  Web-cams, special mouses, Wifi cards and fancy sound cards can all pimp out an otherwise boring computer.  Some of those things are going to be pretty cheap, like laptop covers; and others are going to cost you a lot more, such as fancy graphics cards.  Weigh the benefits against the things that you are going to be using your computer for.  If you are only going to be writing papers, a fancy graphics card might not be a good idea.  If you are going to be designing webpages, it might be worth it. Other gears like the docking station, microphone e.t.c are also available. The rule of thumb here is “Buy What You Need” balancing the cost.

Finally

Though functionality is the word, you still don’t want to by a slimy looking computer without good external appeal. I personally hate ugly computers, no matter how good its functionality. You can also look into the possibility of building your own PC.

HAPPY SHOPPING..!

Windows 7 Professional Vs Windows 7 Enterprise

September 17, 2012 3 comments

The information in the slide above will definitely prove valuable to the choice of the windows OS to deploy in your Organisation. It highlights in details all aspects of both OS for Your consideration. Take time to go through the ten (10) page slide and you’ll simply fall in love with it.

How to fix the Temorary Profile Issue in Windows 7

August 17, 2012 5 comments

Image representing Windows as depicted in Crun...

Image via CrunchBase

In the world of computing, after the release of a new operating system (especially from major players in the software sphere), there arises great expectations on performance and usability. However, time has proven that there will definitely be some inherent flaws in such system due to many techincal reasons which i will not want to bore you with in this post. LOLzzz!

There is a common problem with the Windows 7 platform which can become a hazzle to the user. I call it the “Temporary Profile Syndrome”. After logon you get a message that you have been logged into a temporary profile in Windows 7 computer.This is not your correct profile as its evident from the fact that your Desktop and configuration settings are not present. if you work on this profile, all your documents will be lost after a logoff. restart or a shutdown. Oh what a Syndrome! not to worry though there’s a simple solution. Find below the steps to resolution.

1) Log into the Profile from which you were promted with the Temporary Profile.

2) Start registry editor by typing regedit in find box in Windows 7.

3) Navigate the following location within the Windows 7 Registry “Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList“.(do not do any other thing aside what i discribe, as this may make your computer further unstable. Registry modifications should be done by experts)

5) You can see similar keys under profile list with .bak difference.

(image above obtained from http://www.sysprobs.com)

6) If you have duplicate Keys(one with .bak and the other without .bak), delete the one without .bak and rename the one with the .bak by removing the .bak part of the name.

(image above obtained from http://www.sysprobs.com)

7) Log off and log back in and whao! the issue is resolved.

I do hope this is helpful as we strive to bring you with cutting edge How-Tos

Flame virus can hijack PCs by spoofing Windows Update | Microsoft – CNET News

June 8, 2012 1 comment

The infamous Flame virus can infect even secure PCs by tricking them into believing its malicious payload is actually an update from Microsoft.

As we already know, Flame has gained traction by tapping into security certificates for Microsoft’s Terminal Server. Though they appear to be digitally signed by Microsoft, the certificates are actually cooked up by the people behind Flame, thereby tricking PCs into accepting them as legitimate.

Microsoft and Symantec revealed yesterday that the virus can up the ante by using the fake certificates to spoof Microsoft’s own Windows Update service. As such, Windows PCs could receive an update that claims to be from Microsoft but is in fact a launcher for the malware.

Symantec described the method behind Flame’s madness: The virus, also known as Flamer, uses three applications to infect PCs — Snack, Munch, and Gadget. Collectively, this trio can trick PCs into redirecting Internet traffic to an infected computer with a fake Web server,. Once infected, a PC thinks the file that loads Flame is actually a Windows Update from Microsoft.

And as Symantec explained in its blog, spoofing Windows Update is not a trivial matter.

Hijacking Windows Update is not trivial because updates must be signed by Microsoft. However, Flamer bypasses this restriction by using a certificate that that chains to the Microsoft Root Authority and improperly allows code signing. So when a Windows Update request is received, the GADGET module through MUNCH provides a binary signed by a certificate that appears to belong to Microsoft.

The unsuspecting PC then downloads and executes the binary file, believing it to be a legitimate Windows Update file, Symantec added. The binary is not the Flame virus itself but a loader for Flame.

Microsoft also confirmed the risk to Windows Update, explaining that the vulnerability could be used to attack customers who weren’t the focus of the original Flame virus.

“In all cases, Windows Update can only be spoofed with an unauthorized certificate combined with a man-in-the-middle attack,” Microsoft said. The Flame virus itself has employed a man-in-the-middle attack to steal data, listen in on audio conversations, and take shots of screen activity.

Microsoft has already taken action by issuing a Security Advisory on how to block software signed by the unauthorized certificates, releasing an update to block the rogue certificates, and cutting off the ability of the Terminal Server Licensing Service to issue certificates that allow code to be signed.

To further protect its customers, the software giant is promising to harden its Windows Update service.

“We will begin this update following broad adoption of Security Advisory 2718704 in order not to interfere with that update’s worldwide deployment,” Microsoft said. “We will provide more information on the timing of the additional hardening to Windows Update in the near future.”

Some security experts have downplayed the danger of Flame, claiming it’s not as huge a threat as feared.

So far, the virus has targeted just the Middle East. But security vendor Kaspersky, which discovered the virus, is at the very least increasingly amazed by the complexity of it.

“As we continue our investigation of Flame, more and more details appear which indicate our initial statement: this is one of the most interesting and complex malicious programs we have ever seen,” Kaspersky said in a blog yesterday.

via Flame virus can hijack PCs by spoofing Windows Update | Microsoft – CNET News.

How to Use your Blackberry Internet plan with your Andriod phone.

May 21, 2012 3 comments

NOTE: This method below has seized working. The only option now is to get an Airtel Sim, register for BBC or any other Blackberry internet plan using a Blackberry phone, remove the sim and insert in yourAndroid phone and ZAP!!! you are connected. No rooting! No Special Configs!! Browse away.

The post below is outdated. use an Airtel sim as stated above.

This post is for our audience from Nigeria..it may work with other network if appropriate configuration parameters like the APN, proxy, port, Username and password is known

MATERIALS
1. A rooted android phone.
2. An MTN BIS plan
3. Dolphin mini browser
4. Orbot app
INSTRUCTIONS
make sure you install the browser and the Orbot
apps before you start and you have MTN APN
settings already set up in the phone. finally, make
sure your phone is rooted.
1. create a new APN with these settings
APN = blackberry.net
proxy = blank
port = blank or 8580
Username = web
Password = web
2. save it and make it your default settings.
3. install Orbot and dolphin browser mini.
4. in Orbit settings, tick Tor everything,
transparent proxy, Tor tethering
5. activate your internet access, then start Orbot.
wait until the ON button turns green. then click the
test button,select dolphin browser and wait for the
check tor webpage to show up.
Congratulations,your BIS browsing is now active.

NOTE.
1. For some strange reason, the test webpage
doesn’t show on Opera mini but you can still
browse with it if you ticked “tor everything”
2. this works even when you have zero
naira.however, if you send 2 to 131,it would say
you have no credit.
3. i have tired this on only two android phones and
it works. you may or may not have issues.

Source: nairaland.com

Follow

Get every new post delivered to your Inbox.

Join 61 other followers

%d bloggers like this: