Wednesday, May 28, 2008

I Love My Technorati

Here's The Golden Rule;

1.Copy and Paste the entire page comeback to me and asked me your number
2.Its not necessary to erase once you've done the post already.Just add them in your post.Leave one space at a time.
3.Add title "Tagged Updated" Benefits that will get by playing this game is
4.Your Technorati will gain more Authorities and gain more links,inlinks,backinks too.
5.I will read and survey every links posted and joined this game.Because i know some links is not a good one Remember i am the moderator,i want all the links is good and not a bad one.Promoting bad exposure this is not the game for you.Thanks and God bless.

1.Filipino-Life-Abroad 2.Random Thoughts 3. Proudly Filipina 4. Everyday Lives 5.Bestfriend Blogs 6.Thoughts and Rambling 7. In my Kitchen 8. In the Life Of..Mine 9. Everything Has A Reason 10.Filipina In Hawaii 11.My Daily Ramblings Rendevous 12.Puzzle of my heart 13.Mommy's Little Corner 14.My Drift 15. Twerlermz Blog 16.Blessed Chic 17. Food Hunt and Travel18.My Journal 19.Dancing in Midlife Tune 20.Zamboangenia Pinay 21. Mommie's Space
22. Teachers Corner 23.All about Mye life 24.Fun/Fierce/Fabulous 25.Mobiletechzone 26.Add your link here

Tuesday, May 27, 2008

A Look At Live OneCare Vs ZoneAlarm

Microsoft last month announced a new offering was going into beta, code-named "Albany," that wrapped a number of pieces of software and service into a single bundle -- with the company's Live OneCare security offering a key component. While the software giant is aiming Albany at the consumer space, executives have suggested it could be part of a broader strategy to combine software and services in one package.

Against this backdrop, the Test Center decided to take a new look at Live OneCare and how it stacked up against Check Point's ZoneAlarm product. While Live OneCare may be part of an evolving, bundle-focused, end-point security strategy for Microsoft, can a VAR provide a better solution by going outside the bundle?

If the solution is security or intrusion detection, the problem, of course, is malware.

Though not as glamorous, malware tends to not originate from a single, directed attack by some cyber-criminal intent on wreaking havoc on your customer's systems. Rather, most malware comes from inadvertent misclicks from unknowing users who may have opened infected email attachments, fallen victim to a "drive-by-download" Website, or who may have simply clicked a pop-up ad promising a free iPod.

This means a well-guarded network is not just protected at the gateway, but at the endpoints -- namely the desktops. There's a slew of anti-malware software available for desktop protection. The Test Center took a head-to-look at two: Microsoft's Live OneCare and Check Point's ZoneAlarm Internet Security Suite.

A couple of reasons why these particular applications were pitted against each other: they both target the small/home business crowd (each suite reviewed supports up to 3 PCs), and each sells for the same $49.95.

Testing of each was done on twin HP boxes both installed with Windows Vista Ultimate SP1. On each machine, Windows Firewall was disabled as was Windows Defender. This was done to give a true picture as to the type of malware Live OneCare and ZoneAlarm could pick up and clean without additional software. Testers took a look at installation, configuration and malware fighting abilities of each.


There were differences noted between the two just during install. Zone Alarm installed without one hiccup, prompting for a reboot to complete. Live OneCare's install rolled along, and about mid-way through, the computer rebooted without any messages or warning. Although disconcerting, upon reboot Live OneCare was installed.


Live OneCare had an annoyance factor; to set it up, a log-on using a Windows Live account is necessary. To use this product, a Windows Live account needs to be established. As far as settings go, both applications offer pretty much the same configurable features; anti-virus, anti-spyware and firewall. There are some differences as well. ZoneAlarm lives up to its name by breaking a protected network into three distinct zones: Internet: protects a PC from unknown computers; Trusted: allows sharing of resources with familiar computers; and Blocked Security: to lock out untrusted machines. In a bit of irony, Check Point product's provide protection against spam and phishing for Outlook and Outlook Express. Live OneCare does not have that capability. Live OneCare does have an integrated back up feature, a nice add-on for a very small business or home PCs, but it is limited; you can choose the type of files to back-up but cannot select specified files by location.

Malware Battle

Both products readily detected common types of spyware thrown at them; Virus Ranger, Gator, Generic Adware and other various nuisances were all detected. ZoneAlarm was a bit more adroit at preventing malware install, after reviewers ignored the warning to see if the spyware would be allowed to install. Live OneCare, readily let the installation happen but was quick to provide alerts recognizing the installed code as malicious.

Both programs fared well in Firewall security. Core Security's Core Impact was used to send a battery of exploits against both boxes. Live OneCare's firewall proved slightly more impenetrable; Core Impact was unable to pick up on the type of OS and architecture running on the machine, while the PC running ZoneAlarm gave up that info.

Live OneCare is a decent choice for home use. Microsoft makes it easy to acquire and the fact that it integrates with Windows Live, is probably more convenient for home users. Also, protection from Live OneCare is certainly better than none, and the backup utility is a plus for home users, who may not have such a strategy deployed. But a better option, especially for a small business, is Zone Alarm. The ability to add and remove network computers within zones, gives a control method for securing a small network. Also Zone Alarm has a more detailed alert and reporting system; something a business user would probably need to refer to more than the average home user.

Bottom Line: Let the consumer space have a look at Albany, with Live OneCare. For VARs and professional IT security, a better starting point would be ZoneAlarm.

Saturday, May 24, 2008

Data Breach Victims File Lawsuit Against LendingTree

Online mortgage referral company LendingTree is facing a lawsuit after a security breach in which company employees allegedly allowed mortgage lenders access to customer's confidential information. Altogether, the lawsuit maintained that former company employees gained unauthorized access to sensitive information contained in its loan request forms by using old passwords.

Plaintiffs in the suit, which was filed in the U.S. District Court in Manhattan, N.Y., contend that Lending Tree failed to implement adequate security measures to keep customer's information secure. The employees then used that information, which included names, addresses, phone numbers, Social Security numbers, income and other personal data, to market their own mortgage loans to customers.

The class-action lawsuit represents all LendingTree customers who submitted loan request forms to the company between Jan. 1 2006 and May 1, 2008.

The Charlotte-based company first issued a letter on April 21st warning customers that former employees had helped "a handful of mortgage lenders gain access" to personal customer data by "sharing confidential passwords with the lenders."

The company said the passwords were then used to access LendingTree's customer loan request forms "normally available only to LendingTree-approved lenders," in a scheme to "market loans to those customers," said Lending Tree.

In a subsequent letter, dated May 8, the company warned affected customers that a "handful of mortgage lenders" had accessed loan information without customer consent. The letter went on to advise affected customers to place a security freeze on their own credit file, and included specific instructions which required victims to pay a $5 fee to their respective credit bureaus.

"It's really an access governance issue," said Brian Cleary, vice president of marketing for Aveksa, a security company specializing in enterprise access governance.

"A company like LendingTree has an obligation to put the right framework and controls in place. For them not to take ownership and require people who are at risk to pay is an absolute insult to injury."

Cleary said that consequently, LendingTree could go the way of TJX, Choicepoint , and other companies that have suffered punitive consequences for high-profile data breaches. If the Federal Trade Commission becomes involved, LendingTree could be subject to mandated third party audits and inspections every other year, Cleary said.

Experts say that the lawsuit is emblematic of numerous businesses that fail to adequately monitor or control their company framework or update policies regarding passwords.

To avoid a large-scale breach, experts say that companies will be increasingly required to adopt alternate security solutions to simple passwords, such as two-factor authentication, which incorporates passwords combined with a physical device such as a token, USB stick or key fob.

"Passwords are very low quality authenticators," said Avishai Woll, CTO of AlgoSec, a security risk management solution company. "Security conscious organizations that are concerned about these things, especially banks and financial institutions, lean more toward something like two factor authentication."

The issue is also indicative of the growing insider threat that companies face. A September 2007 PWC survey revealed that an overwhelming majority, 69 percent, of respondents cited employees and former employees as the most likely source of security attacks, surpassing hackers at 41 percent.

The study reported that e-mail and abused user accounts were the primary methods for security breaches, however only 52 percent of respondents said that they their company had implemented adequate security solutions to deal with the problem.

"I think this is a wakeup call to all organizations for taking control of their framework for access governance," said Cleary. "Who wants to be the next poster child for data protection? The legal and regulatory risk and increased operating expenses are just too large to ignore."

Wednesday, May 21, 2008

Chevrolet Europe

Can you thing your day without car? Well with Chevrolet Europe you will be happy to know that you will have lot of choice in cars. There are many models Aveo, Martiz, Captiva, Lacetti, Kalos, find the car that suits you best. So don't wait for a transforming car which keep transforming unwontedly. Lol. For more info visit Chevrolet Europe’s website.


Sponsored by Cheverolet

Subscribe to ~Info Is Knowledge~ by Email

McAfee Security Researcher Faces Trial For Fraud

A McAfee security researcher faces trial for felony fraud charges after selling $1.25 million in fake stock and then using the earnings for personal gain. McAfee employee Brett Oliphant, 29, and his brother Bryan, were accused of fraudulent sale of unregistered securities, in which they cheated victims out of more than $1.2 million.

An Indiana state judge set Oliphant's trial for Nov. 18 in Elkhart County, Ind., for charges related to four class C felonies. Charges against Oliphant include the sale of unregistered securities, transacting business by an unregistered broker or agent, fraudulent or deceitful acts with the sale or purchase of a security, and conspiracy to commit fraudulent or deceitful acts with the sale or purchase of a security.

Oliphant and his brother were accused of selling phony stock through joint businesses called 85 West, LLC and Electronic Scrap Recycling Corporation (ESRC). A private investigation revealed that Oliphant provided victims with fake investment documents about his business and used the money filched from the scam to purchase personal items such as rent, clothing and a vehicle, according to court documents.

The brothers, however, returned $350,000 to two investors who eventually became suspicious, according to the investigation.

According to court documents, all crimes were carried out between Nov 1, 2004 and Aug. 31, 2005 -- before Oliphant joined McAfee in February. Each charge carries a potential sentence of up to eight years in prison.

A collaborative investigation between the Indiana Secretary of State Todd Roikita's Prosecution Assistance Unit along with the Elkhart Country prosecutor and state trooper detectives led to Oliphant's arrest last December in California by the Napa police.

At the time of his arrest, Oliphant served as vice president of security services for ScanAlert, an ecommerce auditing service that scans commercial Web sites and provides them with a "hacker safe" trustmark icon, which McAfee acquired in February. At ScanAlert, Oliphant managed a research team for the company's "Hacker Safe" labs.

Before joining ScanAlert, Oliphant was the founding CTO of Security Profiling, where he developed security management technology, according to his bio on the McAfee site.

EZ Insurance

Insurance policies come in different varieties with a tangle of wording, definitions and exclusions. You need to understand what you want to protect and be certain that you get the right amount of security from your insurer.

Obtaining insurance for your business can be summarized in three basic steps:

1. Understand the different kinds of coverage and determine what kind of protection you want and what is required by law.

2. Review the coverage terms and make sure the policy gives you the level of security your business requires.

3. Put the policy to work. Familiarize yourself with claims filing, deadlines and ways to update the policy as your company grows.

I have a suggestion for you to try EZ Insurance Portal with wide variety of Insurance is offered nowadays such as Home Insurance, Auto Insurance, Life Insurance and Health Insurance. They are also providing Discounts in auto insurance.

Use their Quick Quote Center, on the right side. You just have to choose insurance type and fill the zip code form. Then you will see free home insurance quotes. Fill all the data they ask on the form.

If you want to find real-time quotes of all nations leading insurance providers then EZ Insurance portal is the right place for you. At - they provide you with a complete list of insurance policies that will meet all your needs.

Perfect Cash Advance

Passing through a tough time with shortage of fund that makes it difficult to your next payday! The easiest method of availing the advance cash on net is Perfect Cash Advance.

Generally, payday loans or cash advance are small, short-term loan that is intended to cover a borrower's expenses until his or her next payday. It helps you to raise online cash advance up to $1500, even with your bad credit cash advance. Just fill in the online form with your personal information and Perfect Cash Advance will quickly match you with a lender.

At Perfect Cash Advance, they understand that you need cash in a hurry, which is why many of our cash advance lenders can offer you these attractive qualities:

1) Cash deposited directly into your account on the next business day
2) Quick & Easy - no faxing in many cases
3) Safety & Security Guaranteed
4) 100% online form

As long as you receive a regular source of income of at least $1,000 per month and you have direct deposited enabled on your bank account, many of our lenders can offer you payday loans.

This is a cash advance site that helps consumers meet short term monetary emergencies, with a focus on having the consumer NOT refinance, to save money in the long-run. Cash is deposited into your bank account on the next business day after your application had been approved.

Tuesday, May 20, 2008

Give Yourself A Boost At Work With These Simple, Refreshing Tips

Continued concentration over long periods required in the modern workplace can be demanding on your mind and your body. The stress and fatigue felt by many of us can impact our work performance and lead to ongoing stress and exhaustion when you get home.

However taking a short break to complete a few simple yoga postures at your desk can help to relieve stress and tiredness and refresh you for another work session.

Office yoga part 1
Start by vigorously rubbing your hands together until you feel warmth on your palms. Place your hands on your face with your palms cupping your eyes and your fingers on your forehead making sure that no light gets to your eyes. Hold your hands here with your eyes open and relaxed to relieve eye muscle tensions and eye strain related headaches.

Nadi Shodhana (alternate breathing)
Sit comfortably in your chair with your back tall and straight. Hold your right hand in front of your face with the middle two fingers resting between your eyebrows. Your thumb should be above your right nostril and your ring finger above the left. Close your right nostril with your thumb and breathe in slowly and silently through your left nostril, until your lungs are full without straining. Release the right nostril and close the left nostril with your ring finger. Exhale through the right nostril slowly, keeping the duration of the exhale the same as the inhale. Inhale slowly through the right nostril. Release the left nostril and close the right nostril with your thumb while you exhale. Repeat the sequence 10 times making sure that your breathing is silent.

Mushtika Bandhana (Hand Clenching)
Hold your arms out straight in front of you at shoulder height, palms down, stretching the fingers wide. Close your hands into a fist with the thumb held inside, as you slowly exhale. Slowly inhale as you open your hands and stretch your fingers. Repeat 10 times.

Manibandha Naman (Wrist Flexing)
Holding your arms straight out in front of you, at shoulder level palms down. Inhale as you slowly bend your hand backwards, fingers pointing towards the ceiling. Exhale as you slowly bend the wrist downwards, fingers pointing towards the floor. Repeat 10 times

Manibandha Chakra (Wrist circling)
Hold your right hand straight out in front of you at shoulder level, making a fist with the thumb tucked inside. Rotate the hand in a clockwise circular motion, making as large a circle as possible while keeping the elbow straight and still, keep your breath slow and smooth. Make 10 circles in a clockwise direction, then 10 in the opposite direction. Repeat with the left hand. Alternatively you can work both hands at the same time.

Kehuni Naman (Elbow Bending)
Hold your arms straight out in front of you at shoulder level hand open with the palms facing upwards. As you exhale, bend your arms at the elbow and touch your shoulders. Inhale as you straighten your arms. Repeat 10 times.

Skandha Chakra (Shoulder rotation)
Hold your arms out sideways at shoulder level, bend your elbows and touch your shoulders with your fingers. Rotate your arms in a clockwise direction, making sure that your elbows touch your chest, ears and sides as you make the circle. Keep your breath slow, inhaling as your arms move up, and exhaling as your arms move down. Make 10 complete rotations then repeat in the opposite direction.

Greeva Sanchalana (Neck Movements)
Sit comfortably facing forward with your eyes closed. Exhale as you lower your head trying to touch your chin to your chest. Inhale as you lift your head backwards as far as possible without straining. Repeat 10 times.

Sit comfortably facing forward, eyes closed. Without turning you neck, exhale as you lower your head to the right, trying to touch your right ear to your right shoulder. Breathe in as you raise your head and exhale as you lower it to the left side. Repeat 10 times.

Sit facing forward, eyes closed. Inhale as you turn your head to the right to look over your right shoulder. Inhale as you return to center. Exhale as you turn to the left to look over your left shoulder. Repeat 10 times.

In the same position eyes closed, rotate your head in a clockwise circular motion bringing you head down, to the right, backward and to the left. Exhale as you move your head down, inhale as you move your head up.

38 Scammers Charged

Federal authorities charged 38 individuals with the theft of personal and identifying information over the Internet as part of a phishing scam run by a global crime ring.

Members of the Romanian-based crime ring were accused of tricking thousands of Internet users into handing over personal information, such names, credit card data and Social Security information as well as other personally identifying information, which were then used in identity theft operations.

Federal authorities estimate that the attackers were able to steal millions of dollars from their victims as a result of their phishing operations.

More than half of the accused cyber criminals were from Romania, although the phishing operation was also run in Canada, the U.S., Portugal and Pakistan, federal officials said.

According to indictments recently unsealed in Los Angeles and New Haven, Conn., the scammers targeted thousands of consumers and hundreds of financial institutions with unsolicited spam e-mails. The spam messages attempted to lure victims to fraudulent Web sites that appeared to be from legitimate sources.

In remarks prepared from Bucharest, Romania, U.S. Department of Justice officials underscored that both the Los Angeles and Connecticut cases were emblematic of a growing worldwide threat created by highly organized, international criminal networks with millions of victims in the U.S. and abroad.

"The United States government takes the threat of international organized crime seriously, and the Romanian government does as well," said Deputy Attorney General Mark Filip in a written statement issued from Bucharest, Romania. "In recent years, we have seen an increase in the threat posed by international organized criminals who use cyberspace to target victims around the world. The anonymity of the Internet makes it an ideal tool for this kind of fraud, and law enforcement agencies in the United States have conducted several recent investigations in partnership with our Romanian colleagues. We are proud to do so, and we are learning from each other as we jointly help to protect our citizens and people in other countries from this sort of theft and crime."

Filip said that the users who visited the bogus sites were requested to provide passwords and personal, financial and identifying information. The information was harvested by "suppliers" who, in turn, sent the information to "cashiers" via real-time Internet chat sessions, which the attackers intended to use for financial gain.

In Los Angeles, federal officials handed down 65 counts to 33 people on charges that included racketeering, bank fraud and identity theft. The attackers allegedly stole thousands of credit and debit card accounts from individuals who submitted personal data when they responded to the spam e-mail. The data were then sent back to the U.S. from Romania and encoded on magnetic cards that could be used to withdraw money from bank accounts, according to an Associated Press report.

Meanwhile, in Connecticut, seven Romanians were accused of tricking consumers out of personal information by enticing them to visit a bogus site that appeared to be from the Web site of several legitimate financial institutions, including Citibank, Wells Fargo and PayPal. The seven Romanians -- two of which were involved in the Los Angeles scam -- were indicted in January with fraud and identity theft charges, which were released last week.

Federal officials said that the arrests and charges were the result of a joint operation by the FBI and the Romanian General Inspectorate of Police well as the U.S. Attorney's Offices in Los Angeles and Connecticut.

"This kind of coordinated response is absolutely vital to our fight," said Filip. "International organized criminals who exploit the power and convenience of the Internet do not recognize national borders. Our efforts to stop them cannot end at our borders either."

Subscribe to ~Info Is Knowledge~ by Email

Sunday, May 11, 2008

SocialSpark The Community

Let me introduce you to a new service through which you can gain popularity & earn lots of money. Some weeks ago, I was invited to use this new service "SocialSpark" in its beta phase. I was bit confused to join it or not, i waited for a week then i thought to give it a try. So i Signed up for there service. SocialSpark is a new service of the IZEA network, we know IZEA for services like PayPerPost or RealRank. SocialSpark is a blogging community where you can make Friends, vote for there blog & Prob for them too. You can search for friends with there very friendly search engine. It also help you monetize your blog, build community & drive traffic. Its really a great place to be. I'm really happy to be part of this.

Code of Ethics

100% Audit-able In-Post Disclosure

Your readers trust you. So SocialSpark are committed to keeping it that way. That's why they insist on a strict policy of full in-post disclosure for all sponsored posts.

100% Transparency

Every participant in SocialSpark is made viewable to the public. The public can also see which bloggers are working with which advertisers on which opportunities. This is designed to keep the community honest and open about the transactions that occur.

100% Real Opinions

Subject to the specific agreement you form with an advertiser, you are free to write or say whatever you want. SocialSpark itself has no restrictions on how you express your genuine thoughts on an advertiser's product or service.

100% Search Engine Friendly

Each sponsored link in SocialSpark automatically carries the "no-follow" attribute so as not to affect search engine rankings. This is designed to protect bloggers and advertisers from search engine penalties based on paid linking.


Saturday, May 3, 2008

Blogger's Choice Awards 2008

There is a huge announcement out in net, Blogger's Choice Awards, the most popular user-generated blog voting site on the planet is now accepting nominations for the 2008

There are 38 Award Categories few of them given below:

Best Animal Blogger
Best Blog About Blogging
Best Blog About Stuff
Best Blog Design
Best Blog of All Time
Best Blogging Host
Best Business Blog
Best Celebrity Blogger
Best Charity Blog
Best Corporate Blog
Best Education Blog
Best Entertainment
Blog Best Food Blog
Worst Blog of All Time

So Register now, invite friends, for vote your favorite & get there blog registered too. The more you get vote the more chance to win. Be a top nominated blog.