Pages

Friday, September 17, 2010

Case # 7 Ways to Secure your System from being Compromised

1. Perform daily scans
Occasionally, virus and spyware threats escape a system’s active protective engines and infect a system. The sheer number and volume of potential and new threats make it inevitable that particularly inventive infections will outsmart security software. In other cases, users may inadvertently instruct anti-malware software to allow a virus or spyware program to run.
Regardless of the infection source, enabling complete, daily scans of a system’s entire hard drive adds another layer of protection. These daily scans can be invaluable in detecting, isolating, and removing infections that initially escape security software’s attention.

2.Disable autorun
Many viruses work by attaching themselves to a drive and automatically installing themselves on any other media connected to the system. As a result, connecting any network drives, external hard disks, or even thumb drives to a system can result in the automatic propagation of such threats.
Computer users can disable the Windows autorun feature by following Microsoft’s recommendations, which differ by operating system. Microsoft Knowledge Base articles 967715 and 967940 are frequently referenced for this purpose.

3. Surf smart
Many business-class anti-malware applications include browser plug-ins that help protect against drive-by infections, phishing attacks (in which pages purport to serve one function when in fact they try to steal personal, financial, or other sensitive information), and similar exploits. Still others provide “link protection,” in which Web links are checked against databases of known-bad pages.
Whenever possible, these preventive features should be deployed and enabled. Unless the plug-ins interfere with normal Web browsing, users should leave them enabled. The same is true for automatic pop-up blockers, such as are included in Internet Explorer 8, Google’s toolbar, and other popular browser toolbars.

4. Deploy DNS protection
Internet access introduces a wide variety of security risks. Among the most disconcerting may be drive-by infections, in which users only need to visit a compromised Web page to infect their own PCs (and potentially begin infecting those of customers, colleagues, and other staff).
Another worry is Web sites that distribute infected programs, applications, and Trojan files. Still another threat exists in the form of poisoned DNS attacks, whereby a compromised DNS server directs you to an unauthorized Web server. These compromised DNS servers are typically your ISP’s systems, which usually translate friendly URLs such as yahoo.com to numeric IP addresses like 69.147.114.224.

5.Detecting root-kits
There are two approaches to defending your system against LKM root-kits, a proactive defense and a reactive defense. The detection work can be simple and painless, or difficult and tiring, depending on the approach taken.

6. Continuously update the system
You should conduct security updates frequently. The vast majority of exploits result from known vulnerabilities that have not been patched in time,

7.Avoid using the unstable branch
Unless you want to dedicate time to patch packages yourself when a vulnerability arises, you should not use Debian's unstable branch for production-level systems. The main reason for this is that there are no security updates for unstable (see How is security handled for testing and unstable?, Section 12.3.8).
The fact is that some security issues might appear in unstable and not in the stable distribution. This is due to new functionality constantly being added to the applications provided there, as well as new applications being included which might not yet have been thoroughly tested.
In order to do security upgrades in the unstable branch, you might have to do full upgrades to new versions (which might update much more than just the affected package). Although there have been some exceptions, security patches are usually only back ported into the stable branch. The main idea being that between updates, no new code should be added, just fixes for important issues.

8. Use Legal Operating System and Software
Use legal operating system so that your computer will be secured from hacking because some of free operating system are purpose for hacking someones personal computer. Also in legal software just make sure you will use legal to avoid crashing your computer and avoid from hacking
9.Don't try to fix errors
If your computer crashes don't try to fix it unless you know how to repair it. Call your provider to avoid destroying your system.

10.Backup your files
You must back up your files so that if there is time your computer will crash you have another copy of your file. Also if there also someone destroy your file

Case # 6 Consumer Act of the Philippines

This Consumer Act of the Philippines or R.A 7394 is helpful for every Filipino's its because this act is eventually protecting us in every harmness of a certain product because its stated there that, anyone or anyboby who is selling products in which hazardous content will be penalized and then face sanctions regarding on it.It is great because we can assure that product we buy is safe and good for our health.
It help us to start and to follow the basic rules of our country. Like the drugs or medicine we take the price of it and the price of our food we eat everyday. If there is no act like this it will cause war to both people because misunderstanding.

Wednesday, September 1, 2010

Case #5 How New Technology is Rewiring our Brains?

An issue that comes up more frequently in my therapy practice is the impact of communication technology and the internet on emotional, psychological and relationship health. The seduction of
these tools, though helpful in a myriad of ways, is proving to be increasingly problematic. As a therapist, I’m experiencing first-hand the consequences occurring for people in distruption to relationships via distractibility and inattentiveness – as well as individual struggles with compulsive e-mail checking, social networking site checking and other what I refer to as “rabbit holes” that technology has created for us. As someone who is very connected to this technology myself, I can also relate to the problem potential.

It is ultimately up to us whether we jump into those rabbit holes and if we do, that we can get ourselves out unscathed; without the personal and relational problems I’ve indicated. According to a recent article in The New York Times, people are indeed paying a price for their involvement in technology. “The technology is rewiring our brains,”said Nora Volkow, director of the National Institute of Drug Abuse and one of the world’s leading brain scientists. She and other researchers compare the lure of digital stimulation less to that of drugs and alcohol than to food and sex, which are essential but counterproductive in excess.