Wednesday, January 18, 2012

Currently, Wikipedia Has Protested SOPA and PIPA


SOPA or abbreviation of the Stop Online Piracy Act, a bill introduced by one U.S. representative, Lamar Smith Seeligson submitted to the Congress of the United States.

What is SOPA?

Quoted from Wikipedia about what it SOPA. Slightly more complete than the explanation above, and sufficient to explain what it is SOPA.

The Stop Online Piracy Act (SOPA), That is a bill was introduced in the United States House of Representatives by House Judiciary Committee Chair Representative Lamar Smith (R-TX) and a bipartisan group of 12 initial co-sponsors. The bill expands the ability of U.S. law enforcement and copyright holders to fight online trafficking in copyrighted intellectual property and Counterfeit goods.

SOPA objectives proposed

The goal is to stop the SOPA proposed adverse action the copyright holder (Copyright) piracy or counterfeiting of intellectual property rights on the internet and provide breadth of rights for law enforcement to follow up.

Effect and influence of SOPA

In accordance with SOPA objectives, namely to stop piracy or things that harm the copyright holder, then it will effect a profound effect on what is contained in the Internet world today.

One example is when SOPA be applied to the government of the United States reserves the right to block or even delete the website / blog (seen) copyright infringement (copyright).

They (USA) reserves the right to instruct all of the services still take shelter in their legislation, such as hosting services, the Registrant (domain service provider), online payment service, and even search engine services to cut off access or contact to your website / blog that is seen breaking of copyright.
SOPA, its Pros and Cons

Many people who support the existence of this SOPA, like GoDaddy for instance. GoDaddy is a provider of hosting services and also registrar. If SOPA is passed, then the party will stop service to GoDaddy domains are considered copyright infringement.

This situation is also utilized by other services against SOPA. They (like hostgator, namecheap, or name.com) even issued a discount coupon for anyone who wishes to move a domain from Godaddy to their service.

Some large sites that oppose SOPA include: Google, AOL, Facebook, Twitter, LinkedIn, Zynga, and of course WordPress which campaigns to combat SOPA in one posting - Help Stop SOPA / PIPE. Do not forget, Matt Cutts, the Google engineer also campaigned reject SOPA - Progress against SOPA.
Knot

And now Wikipedia, has been running a protest action, as in the image below

Agree to disagree, like it or not, SOPA is a product and monopoly practices on behalf of copyright protection (copyright). How about you? Supporting SOPA? or opponents?

Manage Cookies In Firefox With Advanced Cookies Manager

Advanced Cookies Manager

I apologize, because this blog has not updated about 2 weeks, because there are busy so I need to do even this blog dormant.

By the way, talking about the Cookies, do you know what is meant by cookies? cookies is small text sent by the server and stored on the browser of computer client that serves for keeping in who we are, so the server not only knows us from ip address, but also through cookies.

So, to manage the name cookies, you need an add-ons firefox to manage cookies, and add-ons that you can use is Advanced Cookies Manager.

Features:
1) Add / Delete / Modify Cookies
2) Filter display of cookies
3) Monitor LIVE cookie changes on the system
4) One Click "Clear all cookies"

And still there are many other features that you can try, therefore you are welcome to download them to a link that has been provided below.

More:
Download: Here

Friday, January 6, 2012

Run Your Software Safely Using Sandboxie

sandboxie

Have you ever confused when running software that you think might be dangerous to your computer? because i believe there is among you must be very confused on the issue, rather than your computer to be exposed to the virus and so on then you would prefer not to run such software.

You can use Sandboxie, with this software you can run the software that you think are not safe to run on your computer, because this software will not save the activity on the software that we run, so i believe it's very safe to run the software you without any worries.

Usually you are afraid of running a software because it is detected by Antivirus as a malicious program. so, the thing that's for sure you were afraid to run a software.

So, this software is only used for those of you who want to see information on the software that we want to run, saving only happens when we run the Sandboxie program and if it closes the program that we run the application will be closed as well and are not stored on our computers.

How To Install:
I'm sure you can install it.

How To Use:
1. Run the Sandboxie.
2. After that, looking for software that you want to run then right click for Run Sandboxed, then it will display the new window and select DefaultBox.
3. In this window you will be warned that you use Sandboxie for 30 days, click Click to close this window and contunue button.
4. If successful you will see the title with # in the program that we run and the border will be yellow. see the picture below:
5. If you want to close it, close it as usual.

More:
Download : Here

Tuesday, January 3, 2012

Download avast! Free Mobile Security For Android

avast! Free Mobile Security for Android

Hi there, I want to tell you about the security application for android. yes, avast! Free Mobile Security for Android the application issued by Avast, This may be particularly useful for the security of your android, because with this application will keep your gadgets safe in the presence of these security applications.

As we have seen, avast! antivirus is one of the world for the computer, and now they also have created the application for android users, so that the better security of your android.

Features:

Description
Full-featured Antivirus and Anti-Theft security for your Android phone.

Protect personal data with automatic virus scans and infected-URL alerts. Stop hackers by adding a firewall (rooted phones). Control anti-theft features with remote SMS commands for: history wipe, phone lock, siren activation, GPS tracking, audio monitoring, and many other useful tools. Your ‘invisible’ app hides itself, making it extremely hard for thieves to find and disable. A standalone yet tightly integrated component of avast! Mobile Security, avast! Anti-Theft is the slyest component on the market. Formerly known as Theft Aware, the Anti-Theft portion of avast! Mobile Security has been recommended by leading industry experts that include T-Mobile, N-TV, AndroidPIT, and Android Police.

avast! Mobile Security

Antivirus

Performs on-demand scans of all installed apps and memory card content, as well as on-access scans of apps upon first execution. Options for scheduling scans, virus definition updates, uninstalling apps, deleting files, or reporting a false-positive to our virus lab.

Privacy Report

Scans and displays (grid) access rights and intents of installed apps, identifying potential privacy risks, so you know how much info you are really providing to each app.

SMS/Call Filtering

Filter calls and/or messages from contact list using set parameters based on day(s) of the week, start time, and end time. Blocked calls redirect to voicemail, while blocked messages are stored via filter log. Also possible to block outgoing calls.

App Manager

Similar to Windows Task Manager, it shows a list of running apps and their size (MB), CPU load, used memory, and number of threads and services – with an option to stop or uninstall.

Web Shield

Part of the avast! WebRep cloud, the avast! Web Shield for Android scans each URL that loads and warns you if the browser loads a malware-infected URL.

Firewall

Add a firewall to stop hackers. Disable an app’s internet access when on WiFi and 3G and roaming mobile networks. (Works only on rooted phones.)

avast! Anti-Theft

App Disguiser

After downloading avast! Anti-Theft, user can choose a custom name that disguises the app (e.g. call it “Pinocchio game”) so that it is even harder for thieves to find and remove.

Stealth Mode

Once anti-theft is enabled, the app icon is hidden in the app tray, leaving no audio or other trace on the target phone – the app is ‘invisible’, making it difficult for thieves to detect or remove.

Self-Protection

Extremely difficult for thieves to remove (especially on rooted phones), Anti-Theft protects itself from uninstall by disguising its components with various self-preservation techniques. On rooted phones it is able to survive hard-resets and can even disable the phone’s USB port.

Battery Save

Anti-Theft only launches itself and runs when it needs to perform tasks. This preserves battery life and makes it very difficult for thieves to shut it down.

SIM-Card-Change Notification

If stolen and a different (unauthorized) SIM card inserted, the phone can lock, activate siren, and send you notification (to remote device) of the phone’s new number and geo-location.

Trusted SIM Cards List

Establish a ‘white list’ of approved SIM cards that can be used in the phone without triggering a theft alert. You can also easily clear the trusted SIM cards list, to leave the one present in the phone as the only trusted one.

Remote Settings Change

A setup wizard guides the user through the installation process on rooted phones. No command-line knowledge is necessary to install Anti-Theft rooted. Also supports upgrading.

Remote Features

SMS commands provide you the following REMOTE options for your ‘lost’ (or stolen) phone:
Siren, Lock, custom Display properties, Locate, Memory Wipe, covert Calling, Forwarding, “Lost” Notification, SMS Sending, History, Restart, and more.

Without strings attached anymore, please download the application.

More
Download: Here

The Importance Of md5 Hash For Your Software

md5 Hash Checker

If you download a file, I am sure you must be very worried if the software you download is inserted malicious programs, then instead of it we need a program that can identify the truth of a software.

You can use the md5 hash checker program, the program can check the correctness of a software file, you only need to upload the file to md5 hash checker.

In this case, does not mean we can check all the software using md5 hash checker, depending on the developer of the software, if they show the md5 hash of the software, then we certainly can check the md5 hash of the software.

Like this principle, that software developers identify their software and spread the md5 hash of the file, then the downloaders see md5 hashes to ensure the correctness of such software, it is also that the downloaders feel secure with the md5 hash.

Usually md5 hash in included on a page and its location adjacent to a link on a software download.

So, for those of you who feel scared of a software, you can verify that software using md5 hash checker, to tackle the threat of malicious programs.

More
Download MD5 Hash Checker : here

Loading

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More